Many Windows applications that support the structured storage file format (Office applications for example) contain support for reading the SummaryInformation stream inside of the OLE document. This stream contains various properties that describe the document (the author for example). In addition to Office, Windows Explorer also supports parsing these streams when a file is clicked and viewed via the preview pane.
Remote exploitation of a type confusion vulnerability in Microsoft Corp.'s Windows could allow an attacker to execute arbitrary code with the privileges of the current user.
The vulnerability occurs in the 'CPropertyStorage::ReadMultiple' function. It is triggered when trying to convert a property in the property set to a variant type. Specifically, a type confusion occurs when a string property is treated as a certain variant. This results in the first 4 bytes of the string being treated as a VTABLE pointer, which can lead to the execution of arbitrary code.
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the user opening the file. To exploit this vulnerability, an attacker needs to convince a user to open a malicious file. Attackers typically accomplish this by e-mailing a targeted user the file or hosting the file on a Web page. Additionally, this vulnerability can be triggered if a user previews the file in Explorer. This can be accomplished by clicking on the file in its folder.
The following Microsoft products are vulnerable:
iDefense is currently unaware of any workaround for this issue.
Microsoft has released updates to address this vulnerability. For more information, consult their advisory at the following URL.
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2011-3400 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.
08/10/2011 Initial Vendor Notification
08/10/2011 Initial Vendor Reply
12/13/2011 Coordinated Public Disclosure
This vulnerability was reported to iDefense by Luigi Auriemma.
Get paid for vulnerability research
Free tools, research and upcoming events
Copyright © 2011 Verisign, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customer service for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.