Word RTF Object Parsing VulnerabilityID: oval:org.mitre.oval:def:5682 | Date: (C)2008-12-09 (M)2023-04-17 |
Class: VULNERABILITY | Family: windows |
Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via (1) an RTF file or (2) a rich text e-mail message containing an invalid number of points for a polyline or polygon, which triggers a heap-based buffer overflow, aka "Word RTF Object Parsing Vulnerability."
Platform: |
Microsoft Windows 2000 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2003 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Microsoft Windows Server 2008 R2 |
Product: |
Microsoft Word 2000 |
Microsoft Word 2002 |
Microsoft Word 2003 |
Microsoft Word 2007 |
Microsoft Outlook 2007 |
Microsoft Word Viewer |
Microsoft Office Compatibility Pack |