Bugtraq mailing list archives

Microsoft Security Bulletin (MS00-049)


From: secnotif () MICROSOFT COM (Microsoft Product Security)
Date: Fri, 14 Jul 2000 11:24:57 -0700


The following is a Security  Bulletin from the Microsoft Product Security
Notification Service.

Please do not  reply to this message,  as it was sent  from an unattended
mailbox.
                    ********************************

-----BEGIN PGP SIGNED MESSAGE-----

Microsoft Security Bulletin (MS00-049)
- --------------------------------------

Patch Available for "The Office HTML Script" Vulnerability and a
Workaround for "The IE Script" Vulnerability

Originally Posted: July 13, 2000

Summary
=======
Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Office 2000 (Excel and PowerPoint) and
in PowerPoint 97. Microsoft has also documented a workaround that
prevents the use of Microsoft Access to exploit a vulnerability in
Internet Explorer. A patch for the latter vulnerability will be
available soon and we will have an update to this bulletin.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-049.asp

Issue
======
Two vulnerabilities have recently been discovered, one affecting
Microsoft Office 2000, and PowerPoint 97, and the other Internet
Explorer 4.01 SP2 and higher. We will refer to these issues as the
"Office script" and "IE script" vulnerabilities. The names refer to
the product where the vulnerability is present, but not necessarily
how the vulnerability is exploited.

The Office HTML Script vulnerability, allows malicious script code on
a web page to reference an Excel 2000 or PowerPoint file in such a
way as to cause a remotely hosted file to be saved to a visiting
user's hard drive.

This vulnerability can only be exploited by a reference to an Excel
2000 or PowerPoint file; it cannot be exploited using Excel 97,
Microsoft Word or a Microsoft Access file.

The IE Script vulnerability, can allow malicious script code on a web
page to reference a remotely hosted Microsoft Access file. The
Microsoft Access file can in turn causes a VBA macro code in the file
to be executed.

Affected Software Versions
==========================
Microsoft Excel 2000
Microsoft PowerPoint 97 and 2000
Microsoft Internet Explorer 5.5, 5.01 SP1, 5.01, 4.01 SP2

Patch Availability
==================
Microsoft Excel 2000 and PowerPoint 2000:
http://officeupdate.microsoft.com/2000/downloaddetails/Addinsec.htm
Microsoft PowerPoint 97:
http://officeupdate.microsoft.com/downloaddetails/PPt97sec.htm

Note Additional security patches are available at the Microsoft
Download Center

More Information
================
Please see the following references for more information related to
this issue.
 - Frequently Asked Questions: Microsoft Security Bulletin MS00-049,
   http://www.microsoft.com/technet/security/bulletin/fq00-049.asp
 - Microsoft Knowledge Base (KB) articles:
   Q268365 (Excel 2000), Q268457 (PowerPoint 2000), Q268477
   (PowerPoint 97) discusses "The Office HTML Script" vulnerability.
 - The Microsoft Office Update Site,
   http://officeupdate.microsoft.com
 - Microsoft TechNet Security web site,
   http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp .

Revisions
=========
July 13, 2000: Bulletin Created.

- -------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.

Last Updated July 13, 2000
(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOW9bC40ZSRQxA/UrAQEMkQgApcmvi+4+ibd3lm1M4ZWGByzPolZJxCTs
wvmGYfpY3aOqzU3iR5vh3OWDI1PZgTh89AzSb0IHIzgv8BS+of9My7twG4ZU2eEw
Srhna4g8/uj7o9Vp8pSuhupgBsaL/B2kGxxZvPGWszABEUCVKEtPwBt35UEZ8EHl
0J/YJAgn0/A+nryQbnqKCLWkKEToriHGEDW+Bt3omJFAnqUNFoZv4JAfdIDqVn01
1i7eHNKTVOIb4ZA9KvH1N7RBsESk/c1AYmLfCzbptU86PsVLYe9q2wTEcpt9pYqU
bwKyaZy6xh/k57dWnH5jEDmxhMSBtbC4Mfd91/z/i4RLUCeQ1WaOWg==
=oW4W
-----END PGP SIGNATURE-----

   *******************************************************************
You have received  this e-mail bulletin as a result  of your registration
to  the   Microsoft  Product  Security  Notification   Service.  You  may
unsubscribe from this e-mail notification  service at any time by sending
an  e-mail  to  MICROSOFT_SECURITY-SIGNOFF-REQUEST () ANNOUNCE MICROSOFT COM
The subject line and message body are not used in processing the request,
and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.

For  more  information on  the  Microsoft  Security Notification  Service
please  visit  http://www.microsoft.com/technet/security/notify.asp.  For
security-related information  about Microsoft products, please  visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.


Current thread: