Vulnerability Note VU#466873
Microsoft Step-by-Step Interactive Training contains a buffer overflow
Overview
Microsoft Step-by-Step Interactive Training contains a buffer overflow vulnerability. If successfully exploited, this vulnerability may allow an attacker to execute arbitrary code.
Description
Microsoft Step-by-Step Interactive Training is a training program developed by MIcrosoft. It is preinstalled by some computer manufactuers and is included in many Microsoft Press books. Microsoft Knowledge Base article 898458 contains a partial list of software and publications that include the Step-by-Step Interactive training. The Step-by-Step Interactive Training contains a buffer overflow. To trigger the vulnerability, an attacker would need to convince a user to open a specially crafted bookmark link file. The bookmark file name extension can be .CBL, .CBM, or .CBO. |
Impact
By convincing a user to open a specially crafted bookmark link file, a remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the user who is running the Step-by-Step Interactive Training program. |
Solution
Update |
|
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Microsoft Corporation | Affected | - | 14 Feb 2007 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
- http://www.microsoft.com/technet/security/Bulletin/ms07-005.mspx
- http://support.microsoft.com/kb/898458
- http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/luawinxp.mspx
- http://secunia.com/advisories/24121/
- http://securitytracker.com/alerts/2007/Feb/1017632.html
- http://www.securityfocus.com/bid/22484
Credit
Thanks to Microsoft for information used in this report. Microsoft in turn thanks Brett Moore of Security-Assessment.com.
This document was written by Ryan Giobbi.
Other Information
- CVE IDs: CVE-2006-3448
- Date Public: 13 Feb 2007
- Date First Published: 14 Feb 2007
- Date Last Updated: 23 Feb 2007
- Severity Metric: 5.13
- Document Revision: 22
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.