Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/416001 | patch third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-005 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2738 | signature vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2348 | signature vdb entry |
http://www.us-cert.gov/cas/techalerts/TA05-039A.html | patch third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4022 | signature vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19107 | vdb entry |