Fortinet Discovers Vulnerability in Microsoft Office Web Components

Fortinet's FortiGuard Intrusion Prevention Service (IPS) Protects Against Remote Code Execution Vulnerability

(PresseBox) ( SUNNYVALE, Calif., )
Fortinet® - a market-leading network security provider and worldwide leader of unified threat management (UTM) solutions - today announced that Fortinet Global Security Research Team recently discovered a critical memory corruption vulnerability existing in the ActiveX Controls of Microsoft Office Web Components, which allows a remote attacker to compromise a system through a malicious site. Fortinet customers using the FortiGuard Intrusion Prevention Service (IPS) should be protected against the remote code execution vulnerability.

The vulnerability lies in the default ActiveX Control installed by Microsoft Office. The vulnerability works by allowing a remote attacker to successfully craft a malicious HTML content which can then exploit the vulnerability in Internet Explorer, causing memory corruption and resulting in a remote-code execution vulnerability through a call instruction.

Fortinet customers subscribing to Fortinet's FortiGuard IPS should be protected against this remote code execution vulnerability. Fortinet's IPS is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and anti-spam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate® appliances, FortiMail(TM) email security, and FortiClient(TM) endpoint products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.

This vulnerability affects the following software: Microsoft Office XP Service Pack 3, Microsoft Office 2003 Service Pack 3, Microsoft Office XP Web Components Service Pack 3, Microsoft Office 2003 Web Components Service Pack 3, Microsoft Office 2003 Web Components for the 2007 Microsoft Office system Service Pack 1, Microsoft Internet Security and Acceleration Server 2004 Standard Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2006, Internet Security and Acceleration Server 2006 Supportability Update, Microsoft Internet Security and Acceleration Server 2006 Service Pack 1, and Microsoft Office Small Business Accounting 2006.

Microsoft is currently working to develop a security update to address this vulnerability; see Microsoft's advisory and workaround solution: http://www.microsoft.com/.... For more information on this vulnerability, please visit http://www.fortiguardcenter.com/....

For ongoing threat research, bookmark the FortiGuard Center (http://www.fortiguardcenter.com/...) or add it to your RSS feed by going to http://www.fortinet.com/.... To learn more about FortiGuard Subscription Services, visit http://www.fortinet.com/....

Copyright © 2009 Fortinet, Inc. All rights reserved. The symbols ® and (TM) denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiDB and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements, certifications or survey results herein attributed to third parties, and Fortinet does not independently endorse such statements.
Für die oben stehenden Pressemitteilungen, das angezeigte Event bzw. das Stellenangebot sowie für das angezeigte Bild- und Tonmaterial ist allein der jeweils angegebene Herausgeber (siehe Firmeninfo bei Klick auf Bild/Meldungstitel oder Firmeninfo rechte Spalte) verantwortlich. Dieser ist in der Regel auch Urheber der Pressetexte sowie der angehängten Bild-, Ton- und Informationsmaterialien.
Die Nutzung von hier veröffentlichten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Bei Veröffentlichung senden Sie bitte ein Belegexemplar an service@pressebox.de.