The vulnerability lies in the default ActiveX Control installed by Microsoft Office. The vulnerability works by allowing a remote attacker to successfully craft a malicious HTML content which can then exploit the vulnerability in Internet Explorer, causing memory corruption and resulting in a remote-code execution vulnerability through a call instruction.
Fortinet customers subscribing to Fortinet's FortiGuard IPS should be protected against this remote code execution vulnerability. Fortinet's IPS is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and anti-spam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate® appliances, FortiMail(TM) email security, and FortiClient(TM) endpoint products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.
This vulnerability affects the following software: Microsoft Office XP Service Pack 3, Microsoft Office 2003 Service Pack 3, Microsoft Office XP Web Components Service Pack 3, Microsoft Office 2003 Web Components Service Pack 3, Microsoft Office 2003 Web Components for the 2007 Microsoft Office system Service Pack 1, Microsoft Internet Security and Acceleration Server 2004 Standard Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2006, Internet Security and Acceleration Server 2006 Supportability Update, Microsoft Internet Security and Acceleration Server 2006 Service Pack 1, and Microsoft Office Small Business Accounting 2006.
Microsoft is currently working to develop a security update to address this vulnerability; see Microsoft's advisory and workaround solution: http://www.microsoft.com/.... For more information on this vulnerability, please visit http://www.fortiguardcenter.com/....
For ongoing threat research, bookmark the FortiGuard Center (http://www.fortiguardcenter.com/...) or add it to your RSS feed by going to http://www.fortinet.com/.... To learn more about FortiGuard Subscription Services, visit http://www.fortinet.com/....
Copyright © 2009 Fortinet, Inc. All rights reserved. The symbols ® and (TM) denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiDB and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements, certifications or survey results herein attributed to third parties, and Fortinet does not independently endorse such statements.