Overview
A buffer overflow vulnerability in the Microsoft Office WordPerfect 5.x Converter could allow a remote attacker to execute arbitrary code on a vulnerable system.
Description
| The Microsoft Office WordPerfect 5.x Converter allows users to convert documents in WordPerfect format to Microsoft Word format. The way the converter validates the length of a parameter before passing it to its allocated buffer creates a buffer overflow vulnerability. By convincing a victim to open a specially crafted WordPerfect 5.x document using the WordPerfect 5.x Converter, a remote attacker could trigger a buffer overflow. According to the Microsoft Security Bulletin, the following software is affected: 
 Microsoft notes that Office 2003 Service Pack 1 is not affected by this vulnerability. | 
Impact
| By convincing a victim to open a specially crafted WordPerfect 5.x document, a remote attacker could execute arbitrary code with the privileges of the vulnerable process. | 
Solution
| Apply Patch | 
| 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://www.microsoft.com/technet/security/bulletin/MS04-027.mspx
- http://secunia.com/advisories/12529/
- http://www.securiteam.com/windowsntfocus/5RP0D1FE0A.html
- http://www.securitytracker.com/alerts/2004/Sep/1011249.html
- http://www.securitytracker.com/alerts/2004/Sep/1011250.html
- http://www.securitytracker.com/alerts/2004/Sep/1011251.html
- http://www.securitytracker.com/alerts/2004/Sep/1011252.html
Acknowledgements
This vulnerability was reported by Microsoft. Microsoft credits Peter Winter-Smith for discovering this vulnerability.
This document was written by Damon Morda based on information provided by Microsoft.
Other Information
| CVE IDs: | CVE-2004-0573 | 
| Severity Metric: | 0.90 | 
| Date Public: | 2004-09-14 | 
| Date First Published: | 2004-09-15 | 
| Date Last Updated: | 2004-09-17 13:42 UTC | 
| Document Revision: | 18 |