CVE-2008-1091

Unspecified vulnerability in Microsoft Word in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 Office System SP1 and earlier allows remote attackers to execute arbitrary code via a Rich Text Format (.rtf) file with a malformed string that triggers a "memory calculation error" and a heap-based buffer overflow, aka "Object Parsing Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*
cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2007_sp1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*
cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:sp1:*:*:*:*:*
cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:word_viewer:2003:*:sp3:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=121129490723574&w=2 - () http://marc.info/?l=bugtraq&m=121129490723574&w=2 -
References () http://secunia.com/advisories/30143 - Vendor Advisory () http://secunia.com/advisories/30143 - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/543907 - US Government Resource () http://www.kb.cert.org/vuls/id/543907 - US Government Resource
References () http://www.securityfocus.com/archive/1/492020/100/0/threaded - () http://www.securityfocus.com/archive/1/492020/100/0/threaded -
References () http://www.securityfocus.com/bid/29104 - () http://www.securityfocus.com/bid/29104 -
References () http://www.securitytracker.com/id?1020013 - () http://www.securitytracker.com/id?1020013 -
References () http://www.us-cert.gov/cas/techalerts/TA08-134A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-134A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2008/1504/references - () http://www.vupen.com/english/advisories/2008/1504/references -
References () http://www.zerodayinitiative.com/advisories/ZDI-08-023 - () http://www.zerodayinitiative.com/advisories/ZDI-08-023 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5494 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5494 -

Information

Published : 2008-05-13 22:20

Updated : 2024-11-21 00:43


NVD link : CVE-2008-1091

Mitre link : CVE-2008-1091

CVE.ORG link : CVE-2008-1091


JSON object : View

Products Affected

microsoft

  • word_viewer
  • office_compatibility_pack_for_word_excel_ppt_2007
  • office
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')