Argument injection vulnerability in a URI handler in Microsoft Office XP SP3, 2003 SP2 and SP3, 2007 Office System Gold and SP1, and Office OneNote 2007 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted onenote:// URL, aka "Uniform Resource Locator Validation Error Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/31067 | vdb entry |
http://marc.info/?l=bugtraq&m=122235754013992&w=2 | vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-055 | vendor advisory |
http://www.insomniasec.com/advisories/ISVA-080910.1.htm | |
http://www.securitytracker.com/id?1020833 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5970 | signature vdb entry |
http://www.securityfocus.com/archive/1/496178/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2008/2523 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA08-253A.html | third party advisory us government resource |