Microsoft Visual Basic for Applications Buffer Overrun Vulnerability
A vulnerability has been discovered in Microsoft Visual Basic for Applications. The vulnerability occurs because the software fails to perform sufficient boundary checks when parsing specific properties of malformed documents. As a result, a malformed document may trigger a buffer overrun within the affected application, effectively allowing arbitrary code to run. Internet Explorer is also reportedly an attack vector, since it may call helper applications when handling certain document types. The exploit involves opening a Word document, selecting 'Insert' - 'Object', selecting 'MSPropertyTreeCtl Class' (or other objects such as ChoiceBox Class, etc), saving the .doc file, and modifying the .doc file by using a binary editor. Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product.