<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3amicrosoftoffice_web_apps2013sp1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3amicrosoftoffice_web_apps2013sp1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Word RTF Heap Overflow Vulnerability (CVE-2023-21716)</title><link>https://feed.craftedsignal.io/briefs/2024-01-microsoft-word-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-microsoft-word-rce/</guid><description>CVE-2023-21716 is a critical heap-based buffer overflow vulnerability in Microsoft Word 2016's RTF parser, triggered by a malformed RTF file, leading to remote code execution on Windows 7.</description><content:encoded><![CDATA[<p>CVE-2023-21716 is a heap-based buffer overflow vulnerability found in Microsoft Word 2016&rsquo;s RTF parser (specifically, in <code>wwlib.dll</code>). The vulnerability stems from improper bounds checking when parsing the <code>\fonttbl</code> tag within an RTF file, particularly when the tag contains an excessive number of font IDs (e.g., <code>\f###</code>). A specially crafted RTF file can trigger the overflow, leading to remote code execution (RCE) with the privileges of the victim user. The vulnerability affects Microsoft Word 2016 on Windows 7 and has a CVSS score of 9.8 (Critical). The attack vector involves delivering the malicious RTF file via email or a shared file location. This vulnerability poses a significant threat because it allows attackers to execute arbitrary code on a vulnerable system simply by enticing a user to open a malicious document.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious RTF file containing an overly large <code>\fonttbl</code> section with many font IDs (<code>\f###</code>).</li>
<li>The attacker sends the malicious RTF file to the victim via email attachment or shared network drive.</li>
<li>The victim opens the RTF file using Microsoft Word 2016 on Windows 7.</li>
<li>Microsoft Word attempts to parse the <code>\fonttbl</code> section of the RTF file using the <code>wwlib.dll</code> library.</li>
<li>Due to the excessive number of font IDs, the bounds check fails, resulting in a heap-based buffer overflow in <code>wwlib.dll</code>.</li>
<li>The overflow overwrites critical data on the heap, leading to memory corruption.</li>
<li>The application crashes with an exception code <code>c0000374</code> (heap corruption).</li>
<li>The attacker leverages the heap overflow to execute arbitrary code within the context of the Microsoft Word process, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-21716 allows an attacker to execute arbitrary code on a vulnerable Windows 7 system running Microsoft Word 2016. This can lead to a complete compromise of the system, including data theft, malware installation, and further lateral movement within the network. The vulnerability has a CVSS score of 9.8 (Critical), reflecting its high severity and potential for widespread impact. While specific victim counts are unavailable, the broad use of Microsoft Word makes this vulnerability a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Although Windows 7 is EOL, consider the following actions if you must continue to support it.</li>
<li>Monitor process creation events for Microsoft Word (<code>WINWORD.EXE</code>) spawning unusual child processes, indicative of successful code execution, and deploy the &ldquo;Microsoft Word Spawning Suspicious Child Process&rdquo; Sigma rule.</li>
<li>Enable process auditing on systems running Microsoft Word and review logs for crashes related to <code>wwlib.dll</code> or exception code <code>c0000374</code>.</li>
<li>Consider blocking RTF files delivered via email at the email gateway. This can prevent the initial attack vector.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2023-21716</category><category>rtf</category><category>heap overflow</category><category>remote code execution</category></item></channel></rss>