Vulnerabilities > CVE-2004-0573 - Unspecified vulnerability in Microsoft products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus

Summary

Buffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS04-027.NASL
descriptionThe remote host is running a version of Microsoft Office that contains a flaw in its WordPerfect converter, that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a specially crafted file to a user on the remote host and wait for him to open it using Microsoft Office. When opening the malformed file, Microsoft Office will encounter a buffer overflow that could be exploited to execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id14732
published2004-09-15
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14732
titleMS04-027: Vulnerability in WordPerfect Converter (884933)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(14732);
 script_version("1.41");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2004-0573");
 script_bugtraq_id(11172);
 script_xref(name:"MSFT", value:"MS04-027");
 script_xref(name:"MSKB", value:"884933");

 script_name(english:"MS04-027: Vulnerability in WordPerfect Converter (884933)");
 script_summary(english:"Determines the version of MSCONV97.dll");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Office.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Microsoft Office that contains
a flaw in its WordPerfect converter, that could allow an attacker to
execute arbitrary code on the remote host.

To exploit this flaw, an attacker would need to send a specially crafted
file to a user on the remote host and wait for him to open it using
Microsoft Office.

When opening the malformed file, Microsoft Office will encounter a
buffer overflow that could be exploited to execute arbitrary code.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2004/ms04-027");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Office 2000, XP and
2003.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2004/09/14");
 script_set_attribute(attribute:"patch_publication_date", value:"2004/09/14");
 script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/15");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:works");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");

 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}


include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");

include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS04-027';
kb = '884933';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

versions = hotfix_check_office_version ();

CommonFilesDirs = hotfix_get_commonfilesdir();
if ( ! CommonFilesDir ) exit(1, "Unable to get common files directory.");

vuln = FALSE;
foreach key (keys(CommonFilesDir))
{
  if ("9.0" >< key || "10.0" >< key)
  {
    dir = CommonFilesDir[key] + "\Microsoft Shared\TextConv";
    share = hotfix_path2share(path:dir);
    if (is_accessible_share(share:share))
    {
      if (hotfix_is_vulnerable(file:"MSCONV97.dll", version:"2003.1100.6252.0", path:dir, bulletin:bulletin, kb:kb))
      {
        vuln = TRUE;
      }
    }
  }
}
if (vuln)
{
  set_kb_item(name:"SMB/Missing/MS04-027", value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

  • accepted2014-01-20T04:01:18.900-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameJohn Hoyland
      organizationCentennial Software
    • nameDragos Prisaca
      organizationG2, Inc.
    descriptionBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
    familywindows
    idoval:org.mitre.oval:def:2670
    statusaccepted
    submitted2004-09-28T12:00:00.000-04:00
    titleOffice 2000 WordPerfect Converter Buffer Overflow
    version10
  • accepted2014-01-20T04:01:19.026-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    commentMicrosoft Office 2003 is installed
    ovaloval:org.mitre.oval:def:233
    descriptionBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
    familywindows
    idoval:org.mitre.oval:def:3311
    statusaccepted
    submitted2004-09-23T12:00:00.000-04:00
    titleOffice 2003 WordPerfect Converter Buffer Overflow
    version11
  • accepted2014-01-20T04:01:19.137-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameDragos Prisaca
      organizationG2, Inc.
    descriptionBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
    familywindows
    idoval:org.mitre.oval:def:3333
    statusaccepted
    submitted2004-09-22T12:00:00.000-04:00
    titleOffice XP, SP3 WordPerfect Converter Buffer Overflow
    version9
  • accepted2014-01-20T04:01:19.205-05:00
    classvulnerability
    contributors
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameDragos Prisaca
      organizationG2, Inc.
    descriptionBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
    familywindows
    idoval:org.mitre.oval:def:4005
    statusaccepted
    submitted2004-09-22T12:00:00.000-04:00
    titleOffice XP, SP2 WordPerfect Converter Buffer Overflow
    version9
  • accepted2007-11-13T12:01:18.060-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJohn Hoyland
      organizationCentennial Software
    • nameJeff Cheng
      organizationOpsware, Inc.
    descriptionThe Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
    familywindows
    idoval:org.mitre.oval:def:5021
    statusaccepted
    submitted2004-10-13T12:21:00.000-04:00
    titleVulnerability in NNTP Could Allow Remote Code Execution
    version31