Microsoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/30975 | third party advisory vendor advisory |
http://isc.sans.org/diary.html?storyid=4696 | |
http://www.microsoft.com/technet/security/advisory/953635.mspx | |
http://www.us-cert.gov/cas/techalerts/TA08-225A.html | third party advisory us government resource |
http://blogs.technet.com/msrc/archive/2008/07/08/vulnerability-in-microsoft-word-could-allow-remote-code-execution.aspx | |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor advisory |
http://www.vupen.com/english/advisories/2008/2028 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5897 | signature vdb entry |
http://www.securityfocus.com/bid/30124 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43663 | vdb entry |
http://www.securitytracker.com/id?1020447 | vdb entry |