This vulnerability was publicly disclosed by Disco Jonny.
Bloodhound.Exploit.108.
Vulnerability details
Advisory: SB2006121503 - Remote code execution in Microsoft Word
Vulnerable component: Microsoft Word
CVE-ID: CVE-2006-6561
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-119 - Memory corruption
Description:
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability is caused by boundary error when processing an unchecked word count in Word files. A remote attacker can create a specially crafted Word file, trick the victim into opening it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Public Exploits:
- Microsoft Word Document - (malformed pointer) (PoC) [Exploit-DB]
External links:
https://technet.microsoft.com/en-us/library/security/ms07-014.aspx
https://blogs.technet.microsoft.com/msrc/2006/12/15/update-on-current-word-vulnerability-reports/
https://www.symantec.com/security_response/writeup.jsp?docid=2006-121412-1329-99
https://www.symantec.com/connect/blogs/word-those-word-vulnerabilities