«
Expand/Collapse
41 items tagged "powerpoint"
Related tags:
safer use [+],
office [+],
oeplaceholderatom [+],
buffer overflow vulnerability [+],
based buffer overflow [+],
zero [+],
remote [+],
powerpoint viewer [+],
powerpoint user [+],
openoffice [+],
microsoft powerpoint viewer [+],
invalid pointer [+],
heap [+],
day [+],
cve [+],
code [+],
microsoft [+],
windows power [+],
viewer [+],
user [+],
txt [+],
stack overflow [+],
size argument [+],
remote buffer overflow vulnerability [+],
remote buffer overflow [+],
record stack [+],
powerpoint graphics [+],
org [+],
microsoft corp [+],
memory allocations [+],
logic error [+],
invalid index [+],
hijacking [+],
heap corruption [+],
dll c [+],
dll [+],
denial of service attack [+],
beta [+],
vulnerabilities [+],
vince [+],
use [+],
tpti [+],
textbytesatom [+],
stack buffer [+],
presentation [+],
powerpoint files [+],
overflow [+],
officeart [+],
microsoft powerpoint 2002 [+],
malformed [+],
mac [+],
linkedslideatom [+],
ipad [+],
invalid [+],
intensive task [+],
hacks [+],
file [+],
cray supercomputer [+],
classic [+],
array [+],
arbitrary code [+],
code execution [+],
microsoft powerpoint [+],
microsoft office powerpoint [+],
vulnerability [+]
-
-
14:01
»
Hack a Day
When [Vince] saw a coworker give a presentation with an iPad, he thought to himself what a tremendous waste of computing resources he was witnessing; an iPad is just as powerful as an early Cray supercomputer, and displaying slides isn’t a computationally intensive task. We’re assuming [Vince]‘s train of thought went off the rails at [...]
-
-
17:16
»
Packet Storm Security Advisories
A review of the code in filter/source/msfilter msdffimp.cxx in OpenOffice.org versions 3.3 and 3.4 Beta revealed some unchecked memory allocations, which could be exploited via malformed Powerpoint graphics records ("escher") to cause bad_alloc exceptions. From this vulnerability a denial of service attack is possible.
-
17:16
»
Packet Storm Security Misc. Files
A review of the code in filter/source/msfilter msdffimp.cxx in OpenOffice.org versions 3.3 and 3.4 Beta revealed some unchecked memory allocations, which could be exploited via malformed Powerpoint graphics records ("escher") to cause bad_alloc exceptions. From this vulnerability a denial of service attack is possible.
-
-
12:54
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
17:39
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
17:39
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
19:47
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Powerpoint 2007.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
15:40
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 11-123 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ppcore.dll module responsible for parsing PowerPoint (ppt) files. When parsing a malformed TimeCommandBehaviorContainer structure the process raises an exception that causes an object in memory to be freed prior to being fully parsed. Due to the lack of a check that this object has been freed, a later function references an invalid pointer element. This can be leveraged by a remote attacker to execute arbitrary code under the context of the user running PowerPoint.
-
15:40
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 11-123 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ppcore.dll module responsible for parsing PowerPoint (ppt) files. When parsing a malformed TimeCommandBehaviorContainer structure the process raises an exception that causes an object in memory to be freed prior to being fully parsed. Due to the lack of a check that this object has been freed, a later function references an invalid pointer element. This can be leveraged by a remote attacker to execute arbitrary code under the context of the user running PowerPoint.
-
15:40
»
Packet Storm Security Misc. Files
Zero Day Initiative Advisory 11-123 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ppcore.dll module responsible for parsing PowerPoint (ppt) files. When parsing a malformed TimeCommandBehaviorContainer structure the process raises an exception that causes an object in memory to be freed prior to being fully parsed. Due to the lack of a check that this object has been freed, a later function references an invalid pointer element. This can be leveraged by a remote attacker to execute arbitrary code under the context of the user running PowerPoint.
-
-
13:58
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Powerpoint 2003.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
22:02
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a logic error in PP7X32.DLL when processing certain records in PowerPoint 95 files and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code.
-
22:01
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a logic error in PP7X32.DLL when processing certain records in PowerPoint 95 files and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code.
-
21:00
»
Packet Storm Security Exploits
Microsoft Windows Power Point 2007 DLL hijacking exploit that leverages pp4x322.dll.
-
-
9:04
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista.
-
-
5:36
»
SecuriTeam
Remote exploitation of a heap-based buffer overflow vulnerability in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
5:33
»
SecuriTeam
Remote exploitation of a use-after-free vulnerability in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
5:31
»
SecuriTeam
Remote exploitation of an invalid array indexing vulnerability in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
17:00
»
Packet Storm Security Recent Files
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint Viewer. User interaction is required to exploit this vulnerability in that the target must open a malicious PowerPoint PPT file. The specific flaw exists in the handling of TextCharsAtom (0x0fa0) records contained in a PPT file. Due to the lack of bounds checking on the size argument an unchecked memcpy copies user-supplied data from the file to the stack, overflowing key exception structures. Exploitation of this vulnerability can lead to remote compromise of the affected system under the credentials of the currently logged in user.
-
17:00
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error when handling file paths and can be exploited to cause a stack-based buffer overflow via a specially crafted file. Successful exploitation allows execution of arbitrary code. Microsoft Powerpoint 2002 is affected.
-
17:00
»
Packet Storm Security Advisories
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint Viewer. User interaction is required to exploit this vulnerability in that the target must open a malicious PowerPoint PPT file. The specific flaw exists in the handling of TextCharsAtom (0x0fa0) records contained in a PPT file. Due to the lack of bounds checking on the size argument an unchecked memcpy copies user-supplied data from the file to the stack, overflowing key exception structures. Exploitation of this vulnerability can lead to remote compromise of the affected system under the credentials of the currently logged in user.