From secnotif@MICROSOFT.COM Thu Aug 10 23:13:30 2000 From: Microsoft Product Security Resent-From: mea culpa To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM Resent-To: jericho@attrition.org Date: Thu, 10 Aug 2000 18:53:13 -0700 Subject: Re-Release - Microsoft Security Bulletin (MS00-056) The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** -----BEGIN PGP SIGNED MESSAGE----- Due to a typographical error, the original version of this Bulletin stated that Word 2000 users who have not applied this patch could protect themselves by "disabling" Confirm conversion on Open. This should have read "enabling". We are re-releasing this Bulletin to correct this error. ====================================================================== Microsoft Security Bulletin (MS00-056) - - --------------------------------------- Patch Available for "Microsoft Office HTML Object Tag" Vulnerability Originally posted: August 09, 2000 Re-released: August 10, 2000 Summary ======= Microsoft has released a patch that eliminates a security vulnerability in certain Microsoft (r) Office 2000 products. The vulnerability could allow a user to construct a HyperText Markup Language (HTML) file that, when read, would crash a Microsoft Office 2000 application or potentially run arbitrary or malicious code. Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-056.asp Issue ===== Microsoft Office 2000 applications are capable of reading HTML files saved as Office documents. A malformed data object tag embedded in one of these documents could cause the Office application to crash and allow arbitrary code to be executed. In order for this behavior to occur, a malicious user would need to entice a user into opening the malformed Office document. Word 2000 users can protect themselves from opening malformed HTML documents within Word by enabling "Confirm conversion at Open" from the Tools-Options-General tab. In addition, Outlook users who have applied the Outlook Security Update will be prompted before opening web hosted or mail-borne Office documents. Affected Software Versions ========================== - Microsoft Word 2000 - Microsoft Excel 2000 - Microsoft PowerPoint 2000 (These products ship as part of the Office 2000 suite and as stand-alone products) Note: Previous versions of these products are not affected by this vulnerability. Note: Office 2000 products other than those specifically listed above are not affected by this vulnerability. Patch Availability ================== - Microsoft Word 2000, Excel 2000, PowerPoint 2000: http://officeupdate.microsoft.com/2000/downloadDetails/Of9data.htm Note: Office 2000 SR-1 is required before this patch can be applied. Note: Additional security patches are available at the Microsoft Download Center More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-056, http://www.microsoft.com/technet/security/bulletin/fq00-056.asp - Microsoft Knowledge Base (KB) article Q269880 http://www.microsoft.com/technet/support/kb.asp?ID=269880 - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Product Support Services is available at http://support.microsoft.com/support/contact/default.asp. Acknowledgments =============== Microsoft thanks Jesper M. Johansson for reporting this issue to us and working with us to protect customers. Revisions - August 09, 2000: Bulletin Created. - August 10, 2000: Bulletin updated to change 'disabling' to 'enabling' in the second paragraph under Issue. - - ------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. (c) 2000 Microsoft Corporation. All rights reserved. Terms of use. -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQEVAwUBOZNcoI0ZSRQxA/UrAQFV6wf/SU15gXpPRIHcr7iZkkjmQ4Qh99E2Hb2w pCil7EblF3KshnQQ6ZliWk0sIwI78qu9dNl0BzzNGgEFAEIuWud7qiAQHZcAwsnt Agjmka6j5fC3z9pgQd7zr1lXqk+yBskY4AHOsviLo1aLhaF5snb75PHgukVNwRrG YFA7O16zTVpwI6fjcdMSzPrk06a3//ahvPoRLY387tgaa+zvCVb7+GjAYsTKBCjB zINZgghjpK1ZB2N9QR4Jj/8wnxsiP0NgLXyQTRLvYlqJk+5+ShLaaRoqQdJfLsFE LZDZ2tBsICE6aZfkDCNDI+/786eiKkWNJbVtl1/CeLqIhNNK/8ki/w== =ad9o -----END PGP SIGNATURE----- ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM The subject line and message body are not used in processing the request, and can be anything you like. To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/technet/security/notify.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.