From secnotif@MICROSOFT.COM Sun Jul 23 00:46:23 2000 From: Microsoft Product Security Resent-From: mea culpa To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM Resent-To: jericho@attrition.org Date: Fri, 14 Jul 2000 11:24:57 -0700 Subject: Microsoft Security Bulletin (MS00-049) The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** -----BEGIN PGP SIGNED MESSAGE----- Microsoft Security Bulletin (MS00-049) - -------------------------------------- Patch Available for "The Office HTML Script" Vulnerability and a Workaround for "The IE Script" Vulnerability Originally Posted: July 13, 2000 Summary ======= Microsoft has released a patch that eliminates a security vulnerability in Microsoft(r) Office 2000 (Excel and PowerPoint) and in PowerPoint 97. Microsoft has also documented a workaround that prevents the use of Microsoft Access to exploit a vulnerability in Internet Explorer. A patch for the latter vulnerability will be available soon and we will have an update to this bulletin. Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-049.asp Issue ====== Two vulnerabilities have recently been discovered, one affecting Microsoft Office 2000, and PowerPoint 97, and the other Internet Explorer 4.01 SP2 and higher. We will refer to these issues as the "Office script" and "IE script" vulnerabilities. The names refer to the product where the vulnerability is present, but not necessarily how the vulnerability is exploited. The Office HTML Script vulnerability, allows malicious script code on a web page to reference an Excel 2000 or PowerPoint file in such a way as to cause a remotely hosted file to be saved to a visiting user's hard drive. This vulnerability can only be exploited by a reference to an Excel 2000 or PowerPoint file; it cannot be exploited using Excel 97, Microsoft Word or a Microsoft Access file. The IE Script vulnerability, can allow malicious script code on a web page to reference a remotely hosted Microsoft Access file. The Microsoft Access file can in turn causes a VBA macro code in the file to be executed. Affected Software Versions ========================== Microsoft Excel 2000 Microsoft PowerPoint 97 and 2000 Microsoft Internet Explorer 5.5, 5.01 SP1, 5.01, 4.01 SP2 Patch Availability ================== Microsoft Excel 2000 and PowerPoint 2000: http://officeupdate.microsoft.com/2000/downloaddetails/Addinsec.htm Microsoft PowerPoint 97: http://officeupdate.microsoft.com/downloaddetails/PPt97sec.htm Note Additional security patches are available at the Microsoft Download Center More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-049, http://www.microsoft.com/technet/security/bulletin/fq00-049.asp - Microsoft Knowledge Base (KB) articles: Q268365 (Excel 2000), Q268457 (PowerPoint 2000), Q268477 (PowerPoint 97) discusses "The Office HTML Script" vulnerability. - The Microsoft Office Update Site, http://officeupdate.microsoft.com - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Product Support Services is available at http://support.microsoft.com/support/contact/default.asp . Revisions ========= July 13, 2000: Bulletin Created. - ------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. Last Updated July 13, 2000 (c) 2000 Microsoft Corporation. All rights reserved. Terms of use. -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQEVAwUBOW9bC40ZSRQxA/UrAQEMkQgApcmvi+4+ibd3lm1M4ZWGByzPolZJxCTs wvmGYfpY3aOqzU3iR5vh3OWDI1PZgTh89AzSb0IHIzgv8BS+of9My7twG4ZU2eEw Srhna4g8/uj7o9Vp8pSuhupgBsaL/B2kGxxZvPGWszABEUCVKEtPwBt35UEZ8EHl 0J/YJAgn0/A+nryQbnqKCLWkKEToriHGEDW+Bt3omJFAnqUNFoZv4JAfdIDqVn01 1i7eHNKTVOIb4ZA9KvH1N7RBsESk/c1AYmLfCzbptU86PsVLYe9q2wTEcpt9pYqU bwKyaZy6xh/k57dWnH5jEDmxhMSBtbC4Mfd91/z/i4RLUCeQ1WaOWg== =oW4W -----END PGP SIGNATURE----- ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM The subject line and message body are not used in processing the request, and can be anything you like. To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/technet/security/notify.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.