TUCoPS :: Windows Apps :: win5344.htm

Office - A variant of "Word Mail Merge" vulnerability
15th May 2002 [SBWID-5344]
COMMAND

	A variant of \"Word Mail Merge\" vulnerability

SYSTEMS AFFECTED

	Office 97, 2000, XP

PROBLEM

	In  ERRor  and  3APA3A  of  dH   team   &   SECURITY.NNOV   advisory
	[http://www.security.nnov.ru/advisories/mailmerge.asp] :
	

	All details on this issue may be found in  [1].  Original  advisory  [2]
	about Word Mail Merge  vulnerability  was  posted  by  Georgi  Guninski.
	Microsoft released an advisory  and  fix  [3]  included  into  SR1a  for
	Microsoft Office.
	 

	 Description

	 ===========

	

	Microsoft   decided    to    disallow    dotted    UNC    paths    (like
	\\\\111.111.111.111\\)  for  merge  documents  as  a  fix.  It\'s  still
	possible to use any absolute or relative paths to make word  document  to
	open macro silently in Office 97, 2000  and  XP.  This  vulnerability  can
	be remotely exploited if attacker can put both Word and  Access  documents
	into the same location or to put Access document into known location  (for
	example to put both files into same Internet Explorer cache  folder).  Access
	file may have any extension (.wav, .html, .txt) it doesn\'t  matter.  Microsoft
	Office 2000 SR1a + SP2 and Microsoft Office XP + SP1 do  not  allow  Access
	to open  files  from  Temporary  Internet  Files  folder,  it  makes  it
	impossible to exploit this vulnerability via Outlook Express.
	

	 Exploitation 

	 ============

	

	It\'s possible to exploit  this  vulnerability  locally  or  via  social
	Engineering (for example to craft an archive  of  3  files:  readme.doc,
	setup.dat and setup.exe where setup.exe is trojan and setup.dat  is  MDB
	file launching setup.exe, if user opens  readme.doc  setup.exe  will  be
	started automatically) Simple extract [4] and open expl.doc  -  calc.exe
	will  be  started.
	

	Because Outlooks Express and Internet Explorer open .doc  files  without
	warning it\'s  possible  to  exploit  this  vulnerability  remotely  [5]
	without user\'s intervention. Exploit works as follow:
	

	 1. Both DOC and MDB files are attached with .doc extension

	 2.  They are referenced via IFRAME tag. It makes both files to be saved

	 into same cache folder and launched in MS Word.

	 3. expl.doc opens exploit.doc and exploit.doc starts calc.exe

	

	For some unknown reason Internet Explorer 6.0 strips 2  last  characters
	from filename  in  cache,  so  there  is  different  .eml  for  Internet
	Explorer 6.0.
	

	

	1. Microsoft Word Mail Merge vulnerability

	   http://www.security.nnov.ru/search/news.asp?binid=415

	2. Georgi  Guninski,  MS  Word  and MS Access vulnerability - executing

	   arbitrary programs, may be exploited by IE/Outlook

	   http://www.security.nnov.ru/search/document.asp?docid=518

	3. Microsoft Security Bulletin (MS00-071)

	   Patch Available for \"Word Mail Merge\" Vulnerability

	   http://www.microsoft.com/technet/security/bulletin/fq00-071.asp

	4. Mail merge vulnerability local POC

	   http://www.security.nnov.ru/files/mailmerge/2files.zip

	5. Mail merge vulnerability Outlook Express POC

	   http://www.security.nnov.ru/files/mailmerge/2mails.zip

	

SOLUTION

	Microsoft recommends to install SP2 for Office  2000.  It  fixes  remote
	exploitation scenario via Outlook Express, but not local issue.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH