[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Word RTF Object Parsing Vulnerability

ID: oval:org.mitre.oval:def:5682Date: (C)2008-12-09   (M)2023-04-17
Class: VULNERABILITYFamily: windows




Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via (1) an RTF file or (2) a rich text e-mail message containing an invalid number of points for a polyline or polygon, which triggers a heap-based buffer overflow, aka "Word RTF Object Parsing Vulnerability."

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2003
Microsoft Windows 10
Microsoft Windows Server 2008
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows Server 2008 R2
Product:
Microsoft Word 2000
Microsoft Word 2002
Microsoft Word 2003
Microsoft Word 2007
Microsoft Outlook 2007
Microsoft Word Viewer
Microsoft Office Compatibility Pack
Reference:
CVE-2008-4025
CVE    1
CVE-2008-4025
CPE    10
cpe:/a:microsoft:word:2002:sp3
cpe:/a:microsoft:word:2003:sp3
cpe:/a:microsoft:word:2007
cpe:/a:microsoft:outlook:2007
...

© SecPod Technologies