CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.1%
Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via (1) an RTF file or (2) a rich text e-mail message containing an invalid number of points for a polyline or polygon, which triggers a heap-based buffer overflow, aka “Word RTF Object Parsing Vulnerability.”
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | office | 2004 | cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:* |
microsoft | office | 2008 | cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:* |
microsoft | office_compatibility_pack_for_word_excel_ppt_2007 | * | cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:* |
microsoft | office_compatibility_pack_for_word_excel_ppt_2007 | * | cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:* |
microsoft | office_word_viewer | 2003 | cpe:2.3:a:microsoft:office_word_viewer:2003:*:*:*:*:*:*:* |
microsoft | office_word_viewer | 2003 | cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:* |
microsoft | open_xml_file_format_converter | * | cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:* |
microsoft | works | 8.0 | cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:* |
microsoft | office_outlook | 2007 | cpe:2.3:a:microsoft:office_outlook:2007:*:*:*:*:*:*:* |
microsoft | office_outlook | 2007 | cpe:2.3:a:microsoft:office_outlook:2007:sp1:*:*:*:*:*:* |
secunia.com/secunia_research/2008-21/
www.securityfocus.com/archive/1/499054/100/0/threaded
www.securitytracker.com/id?1021370
www.us-cert.gov/cas/techalerts/TA08-344A.html
www.vupen.com/english/advisories/2008/3384
docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5682