TippingPoint Digital Vaccine Laboratories
DID YOU KNOW... TippingPoint customers were protected against 0-day exploitation of MS07-017 two years prior to the exploit being discovered in the wild.

Microsoft Office RTF \dpendgroup Control Word Buffer Overflow Vulnerability

TPTI-08-08: December 9th, 2008


Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 6612. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of multiple Microsoft products. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file or e-mail message.

The specific flaw exists in the parsing of mismatched \dpgroup and \dpendgroup control words. If a specially crafted RTF file contains excessive \dpendgroup tags a memory miscalculation can lead to an exploitable buffer overflow. Exploitation of this issue leads to arbitrary code execution under the context of the user accessing the file.

Vendor Response

Microsoft has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2008-07-08 - Vulnerability reported to vendor
    2008-12-09 - Coordinated public release of advisory


This vulnerability was discovered by: