Arbitrary Code Execution Vulnerability in Microsoft WordPerfect Converter

Reported September 3, 2003, by Microsoft.




  • Microsoft Works Suite 2003, 2002, and 2001
  • Microsoft Publisher 2002 and 2000
  • Microsoft FrontPage 2002 and 2000
  • Microsoft Word 98
  • Microsoft Office XP, 2000, and 97




A vulnerability in Microsoft WordPerfect Converter can result in the execution of arbitrary code on the vulnerable system. This vulnerability stems from a flaw in the way Microsoft's WordPerfect converter handles Corel WordPerfect documents. Because the converter doesn't correctly validate certain parameters when it opens a WordPerfect document, an unchecked buffer occurs. An attacker can therefore craft a malicious WordPerfect document to allow code of his or her choice to execute if an application that used the WordPerfect converter opened the document.



Microsoft has released Security Bulletin MS03-036, "Buffer Overrun in WordPerfect Converter Could Allow Code Execution (827103)," to address this vulnerability and recommends that affected users apply the appropriate patch mentioned in the bulletin.


Discovered by eEye Digital Security.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.