Vulnerabilities > CVE-2007-1754 - Resource Management Errors vulnerability in Microsoft Publisher 2007

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
CWE-399
critical
nessus

Summary

PUBCONV.DLL in Microsoft Office Publisher 2007 does not properly clear memory when transferring data from disk to memory, which allows user-assisted remote attackers to execute arbitrary code via a malformed .pub page via a certain negative value, which bypasses a sanitization procedure that initializes critical pointers to NULL, aka the "Publisher Invalid Memory Reference Vulnerability".

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS07-037.NASL
descriptionThe remote host is running a version of Microsoft Publisher that may allow arbitrary code to be run. To succeed, the attacker would have to send a rogue file to a user of the remote computer and have it open it.
last seen2020-06-01
modified2020-06-02
plugin id25688
published2007-07-10
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/25688
titleMS07-037: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (936548)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(25688);
 script_version("1.31");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2007-1754");
 script_bugtraq_id(22702);
 script_xref(name:"MSFT", value:"MS07-037");
 script_xref(name:"MSKB", value:"936646");
 

 script_name(english:"MS07-037: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (936548)");
 script_summary(english:"Determines the version of MSPUB.exe");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Microsoft
Publisher.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Microsoft Publisher that may
allow arbitrary code to be run.

To succeed, the attacker would have to send a rogue file to a user of
the remote computer and have it open it.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2007/ms07-037");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Publisher 2007.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"exploited_by_malware", value:"true");
 script_cwe_id(399);

 script_set_attribute(attribute:"vuln_publication_date", value:"2007/07/10");
 script_set_attribute(attribute:"patch_publication_date", value:"2007/07/10");
 script_set_attribute(attribute:"plugin_publication_date", value:"2007/07/10");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:publisher");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_nt_ms02-031.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, "Host/patch_management_checks");

 exit(0);
}

include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("misc_func.inc");
include("audit.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS07-037';
kbs = make_list("936646");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

port = get_kb_item("SMB/transport");

list = get_kb_list_or_exit('SMB/Office/Publisher/*/ProductPath');
foreach item (keys(list))
{
  v = item - 'SMB/Office/Publisher/' - '/ProductPath';
  if(ereg(pattern:"^12\..*", string:v))
  {
    # Publisher 2007 - fixed in 12.0.6023.5000
    middle =  ereg_replace(pattern:"^12\.0\.([0-9]*)\.[0-9]*$", string:v, replace:"\1");
    low =  ereg_replace(pattern:"^12\.0\.[0-9]*\.([0-9]*)$", string:v, replace:"\1");
    if(middle != v && int(middle) < 6023 || ( int(middle) == 6023 && int(low) < 5000)) {
      set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
      info =
        '\n  Product           : Publisher 2007' +
        '\n  Installed version : ' + v +
        '\n  Fixed version     : 12.0.6023.5000\n';
      hotfix_add_report(info, bulletin:'MS07-037', kb:'936646');
      hotfix_security_hole();
      exit(0);
    }
  }
}
audit(AUDIT_HOST_NOT, 'affected');

Oval

accepted2014-08-18T04:02:02.413-04:00
classvulnerability
contributors
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
definition_extensions
commentMicrosoft Publisher 2007 is installed
ovaloval:org.mitre.oval:def:2127
descriptionPUBCONV.DLL in Microsoft Office Publisher 2007 does not properly clear memory when transferring data from disk to memory, which allows user-assisted remote attackers to execute arbitrary code via a malformed .pub page via a certain negative value, which bypasses a sanitization procedure that initializes critical pointers to NULL, aka the "Publisher Invalid Memory Reference Vulnerability".
familywindows
idoval:org.mitre.oval:def:1871
statusaccepted
submitted2007-07-11T01:02:31
titlePublisher Invalid Memory Reference Vulnerability
version13

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 22702 CVE ID:CVE-2007-1754 CNCVE ID:CNCVE-20071754 Microsoft Office是一款微软开发的流行的文字处理软件。 Microsoft Office包含的Publisher 2007存在一个未明缺陷,远程攻击者可以利用漏洞以应用程序进程权限执行任意指令。 Publisher 2007在当应用程序从磁盘写数据到内存时,不充分清楚内存资源,可导致非法内存应用而造成拒绝服务,存在任意代码执行可能。 Microsoft Publisher 2007 0 Microsoft Office 2007 0 + Microsoft Access 2007 0 + Microsoft Access 2007 0 + Microsoft Communicator 2007 0 + Microsoft Communicator 2007 0 + Microsoft Excel 2003 + Microsoft Excel 2007 0 + Microsoft Excel 2007 0 + Microsoft FrontPage 2003 + Microsoft Groove 2007 0 + Microsoft Groove 2007 0 + Microsoft InfoPath 2003 + Microsoft InfoPath 2007 0 + Microsoft InfoPath 2007 0 + Microsoft Office Word 2007 0 + Microsoft Office Word 2007 0 + Microsoft OneNote 2003 0 + Microsoft Outlook 2003 0 + Microsoft Outlook 2007 0 + Microsoft Outlook 2007 0 + Microsoft PowerPoint 2003 0 + Microsoft PowerPoint 2007 0 + Microsoft PowerPoint 2007 0 + Microsoft Project Professional 2007 0 + Microsoft Project Professional 2007 0 + Microsoft Project Standard 2007 0 + Microsoft Project Standard 2007 0 + Microsoft Publisher 2003 + Microsoft Publisher 2007 0 + Microsoft Publisher 2007 0 + Microsoft SharePoint Designer 2007 0 + Microsoft SharePoint Designer 2007 0 + Microsoft Visio Professional 2007 0 + Microsoft Visio Professional 2007 0 + Microsoft Visio Standard 2007 0 + Microsoft Visio Standard 2007 0 + Microsoft Word 2003 补丁下载: Microsoft Publisher 2007 0 * Microsoft Security Update for Microsoft Office Publisher 2007 (KB936646) <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=25D272E7-F2DD" target="_blank">http://www.microsoft.com/downloads/details.aspx?FamilyId=25D272E7-F2DD</a> -4342-92BE-7EBC2E770B44
idSSV:1997
last seen2017-11-19
modified2007-07-12
published2007-07-12
reporterRoot
titleMicrosoft Office Publisher未明远程代码执行漏洞