S-375: Vulnerarability in Microsoft Office


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-375: Vulnerarability in Microsoft Office
# 1  
Old 09-10-2008
S-375: Vulnerarability in Microsoft Office

A remote code execution vulnerability exists in the way that Microsoft Office handles specially crafted URLs using the OneNote protocol handler (onenote://). The vulnerability could allow remote code execution if a user clicks a specially crafted OneNote URL. The risk is MEDIUM. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
pacparser_enable_microsoft_extensions(3)		     Library Functions Manual			  pacparser_enable_microsoft_extensions(3)

NAME
pacparser_enable_microsoft_extensions - Enable Microsoft PAC extensions. SYNOPSIS
#include <pacparser.h> void pacparser_enable_microsoft_extensions(void); DESCRIPTION
Enables a subset of Microsoft PAC extensions - dnsResolveEx, myIpAddressEx, isResolvableEx. These functions are used by Google Chrome and IE to work with IPv6. More info: http://code.google.com/p/pacparser/issues/detail?id=4. SEE ALSO
pacparser_version(3), pacparser_init(3), pacparser_parse_pac_file(3), pacparser_parse_pac_string(3), pacparser_parse_pac(3), pac- parser_find_proxy(3), pacparser_just_find_proxy(3), pacparser_cleanup(3), pacparser_setmyip(3) c2man pacparser.h 14 March 2011 pacparser_enable_microsoft_extensions(3)