BUGTRAQ ID: 27738 CVE(CAN) ID: CVE-2008-0103 Microsoft Office是非常流行的办公软件套件。 Microsoft Office在处理注入了畸形对象的Office文件时存在内存破坏漏洞,如果用户受骗打开了特制的Office文件的话,就可能触发这个漏洞,导致执行任意指令。 Microsoft Office XP SP3 Microsoft Office 2004 for Mac Microsoft Office 2003 Service Pack 2 Microsoft Office 2000 Service Pack 3 临时解决方法: * 限制对VBE6.dll的访问,在命令行键入: Windows XP: Echo y|cacls "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /E /P everyone:N Windows Vista: Takeown.exe /f "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" Icacls.exe "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /save %TEMP%\VBE6_ACL.TXT Icacls.exe "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /deny everyone:(F) 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-013)以及相应补丁: MS08-013:Vulnerability in Microsoft Office Could Allow Remote Code Execution (947108) 链接:<a...
BUGTRAQ ID: 27738 CVE(CAN) ID: CVE-2008-0103 Microsoft Office是非常流行的办公软件套件。 Microsoft Office在处理注入了畸形对象的Office文件时存在内存破坏漏洞,如果用户受骗打开了特制的Office文件的话,就可能触发这个漏洞,导致执行任意指令。 Microsoft Office XP SP3 Microsoft Office 2004 for Mac Microsoft Office 2003 Service Pack 2 Microsoft Office 2000 Service Pack 3 临时解决方法: * 限制对VBE6.dll的访问,在命令行键入: Windows XP: Echo y|cacls "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /E /P everyone:N Windows Vista: Takeown.exe /f "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" Icacls.exe "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /save %TEMP%\VBE6_ACL.TXT Icacls.exe "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /deny everyone:(F) 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-013)以及相应补丁: MS08-013:Vulnerability in Microsoft Office Could Allow Remote Code Execution (947108) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/MS08-013.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/MS08-013.mspx?pf=true</a>