Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via (1) an RTF file or (2) a rich text e-mail message containing an invalid number of points for a polyline or polygon, which triggers a heap-based buffer overflow, aka "Word RTF Object Parsing Vulnerability."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5682 | vdb entry signature |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 | vendor advisory |
http://www.securitytracker.com/id?1021370 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA08-344A.html | third party advisory us government resource |
http://www.vupen.com/english/advisories/2008/3384 | vdb entry vendor advisory |
http://secunia.com/secunia_research/2008-21/ | vendor advisory |
http://www.securityfocus.com/archive/1/499054/100/0/threaded | mailing list |