Published: 2008-08-13T14:26+00:00
Last Updated: 2008-12-28T00:55+00:00
TRTA08-225A
Microsoft Updates for Multiple Vulnerabilities
Overview
Microsoft has released updates that address vulnerabilities in Microsoft Windows, Office, and Internet Explorer.
Event Information
Date (UTC) | Description |
2008-10-12 |
Bugtraq MS Windows InternalOpenColorProfile Heap Overflow PoC (MS08-046) Microsoft Color Management System Vulnerability (MS08-046, CVE-2008-2245) #Cid: 2008-emf_MS08-046.rar #Cid: 30594.rar #Tested: Windows XP PRO SP2 #Tested: cpe:/o:microsoft:windows_xp::sp2:professional |
2008-08-13 02:39 |
Microsoft Microsoft Security Advisory (953635): Vulnerability in Microsoft Word Could Allow Remote Code Execution Word Record Parsing Vulnerability (MS08-042, CVE-2008-2244) Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS08-042 to address this issue. |
2008-08-13 02:39 |
Microsoft Microsoft Security Advisory (955179): Vulnerability in the ActiveX Control for theSnapshot Viewer for Microsoft Access Could Allow Remote CodeExecution Snapshot Viewer Arbitrary File Download Vulnerability (MS08-041, CVE-2008-2463) Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS08-041 to address this issue. |
2008-08-13 02:39 |
Microsoft MS08-AUG: Microsoft Security Bulletin Summary for August 2008 Included in this advisory are updates for newly discovered vulnerabilities. |
2008-08-13 01:25 |
JPCERT/CC JPCERT-AT-2008-0015: August 2008 Microsoft Security Bulletin (including six critical patches) |
2008-08-12 20:29 |
SANS Internet Storm Center August 2008 Black Tuesday Overview Overview of the August 2008 Microsoft patches and their status. |
2008-08-12 19:52 |
US-CERT TA08-225A: Microsoft Updates for Multiple Vulnerabilities Via US-CERT Mailing List |
2008-08-12 18:16 |
Symantec ThreatCON (1) => (2) The ThreatCon is at level 2. Microsoft has released the scheduled security bulletins for the month of August 2008. |
2008-08-11 16:41 |
US-CERT Microsoft Releases August Security Bulletin US-CERT Current Activity US-CERT is aware of public reports of a vulnerability that affects Webex Meeting Manager. This vulnerability is due to improper handling of arguments passed to the "NewObject()" method within the WebexUCFObject ActiveX control (atucfobj.dll). By convincing a user to visit a specially crafted web page, a remote attacker may be able to execute arbitrary code. |
2008-07-09 10:04 |
Trend Micro Let the Games Begin TrendLabs | Malware Blog - by Trend Micro |
2008-07-09 03:13 |
Microsoft Microsoft Security Advisory (953635): Vulnerability in Microsoft Word Could Allow Remote Code Execution Word Record Parsing Vulnerability (MS08-042, CVE-2008-2244) Advisory published. Microsoft is investigating new public reports of a possible vulnerability in Microsoft Office Word 2002 Service Pack 3. |
2008-07-09 02:20 |
SANS Internet Storm Center Unpatched Word Vulnerability (Version: 1) What a busy day! Microsoft just released an advisory with details about a new vulnerability in Word, which is currently being exploited in targeted attacks. |
2008-07-09 |
Trend Micro TROJ_MDROPPER.ZT Exploit for Word Record Parsing Vulnerability (MS08-042, CVE-2008-2244) |
2008-07-08 13:01 |
US-CERT Microsoft Releases Security Advisory for Word Vulnerability US-CERT Current Activity Microsoft has released a Security Advisory to address a vulnerability in Microsoft Word. The advisory indicates that this vulnerability affects Microsoft Office Word 2002 Service Pack 3. By convincing a user to open a specially crafted Word file, a remote attacker may be able to execute arbitrary code or cause a denial-of-service condition. Additionally, the advisory indicates that Microsoft is aware of limited, targeted attacks attempting to exploit this vulnerability. |
2008-07-08 06:55 |
Microsoft Security Response Center Blog Microsoft Security Advisory 953635 |
2008-07-07 18:19 |
Microsoft Microsoft Security Advisory (955179): Vulnerability in the ActiveX Control for theSnapshot Viewer for Microsoft Access Could Allow Remote CodeExecution Snapshot Viewer Arbitrary File Download Vulnerability (MS08-041, CVE-2008-2463) Advisory published. |
2008-04-16 |
Zero Day Initiative (ZDI) ZDI-08-051: Microsoft Internet Explorer Table Layout Memory Corruption Vulnerability HTML Objects Memory Corruption Vulnerability (MS08-045, CVE-2008-2258) Vulnerability Reported |
2008-04-16 |
Zero Day Initiative (ZDI) ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability HTML Objects Memory Corruption Vulnerability (MS08-045, CVE-2008-2257) Vulnerability Reported |
2008-04-16 |
Zero Day Initiative (ZDI) ZDI-08-048: Microsoft Excel COUNTRY Record Memory Corruption Vulnerability Excel Record Parsing Vulnerability (MS08-043, CVE-2008-3006) Vulnerability Reported |
2008-04-10 |
iDefense Microsoft Windows Color Management Module Heap Buffer Overflow Vulnerability Microsoft Color Management System Vulnerability (MS08-046, CVE-2008-2245) Vulnerability Reported This vulnerability specifically exists in the InternalOpenColorProfile function in mscms.dll. When a malformed parameter is supplied, a heap-based buffer overflow can occur, resulting in an exploitable condition. |
2008-03-27 |
iDefense Microsoft Excel FORMAT Record Invalid Array Index Vulnerability Excel Index Array Vulnerability (MS08-043, CVE-2008-3005) Vulnerability Reported This issue exists in the handling of "FORMAT" records within an Excel spreadsheet (XLS). By crafting a spreadsheet with an out-of-bounds array index, attackers are able to cause Excel to write a byte to arbitrary locations in stack memory. |
2008-03-27 |
iDefense Microsoft Excel Chart AxesSet Invalid Array Index Vulnerability Excel Indexing Validation Vulnerability (MS08-043, CVE-2008-3004) Vulnerability Reported This issue exists in the handling of "AxesSet" records within a chart embedded in a spreadsheet. This record is typically used for setting the location and size of a set of axes on a chart. This particular record type is not included in Microsoft's official documentation for the Excel file format. However, the freely available source code for OpenOffice implements this record type. |
2007-09-28 |
iDefense Microsoft PowerPoint Viewer 2003 Cstring Integer Overflow Vulnerability Memory Allocation Vulnerability (MS08-051, CVE-2008-0120) Vulnerability Reported This vulnerability specifically exists when handling CString objects embedded in a PowerPoint presentation file. An issue in this object results in a very small amount of buffer being allocated while a very large amount of data is copied into it. This leads to an exploitable heap-based buffer overflow. |
2007-09-28 |
iDefense Microsoft PowerPoint Viewer 2003 Out of Bounds Array Index Vulnerability Memory Calculation Vulnerability (MS08-051, CVE-2008-0121) Vulnerability Reported This vulnerability specifically exists in PowerPoint Viewer 2003 when handling certain records in a PowerPoint presentation file. In some circumstances, an array index can be directly controlled by data from within the PowerPoint presentation file. Thus, a function pointer can be directly controlled by the attacker and leveraged for arbitrary code execution. |
2006-11-07 |
iDefense Microsoft Office WPG Image File Heap Buffer Overflow Vulnerability Microsoft Office WPG Image File Heap Corruption Vulnerability (MS08-044, CVE-2008-3460) Vulnerability Reported This vulnerability specifically lies within the "WPGIMP32.FLT" module. A heap overflow can occur when processing a malformed Wordperfect Graphics (WPG) file. By corrupting heap memory, it is possible to execute arbitrary code. |
2006-09-14 |
Zero Day Initiative (ZDI) ZDI-08-049: Microsoft Windows Graphics Rendering Engine PICT Heap Corruption Microsoft PICT Filter Parsing Vulnerability (MS08-044, CVE-2008-3021) Vulnerability Reported |
2006-09-11 |
iDefense Microsoft Office BMP Input Filter Heap Overflow Vulnerability Microsoft Malformed BMP Filter Vulnerability (MS08-044, CVE-2008-3020) Vulnerability Reported The vulnerability specifically exists in the handling of Windows Bitmap (BMP) image files with malformed headers. By specifying a very large number of colors in the header, it is possible to cause controllable heap corruption, which can be leveraged to execute arbitrary code. |