Executive Summary

Informations
NameCVE-2010-0033First vendor Publication2010-02-10
VendorCveLast vendor Modification2018-10-12

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides administrator access : Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0033

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:7711
 
Oval ID: oval:org.mitre.oval:def:7711
Title: PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability
Description: Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-0033
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Product(s): Microsoft Office PowerPoint 2003
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

SAINT Exploits

DescriptionLink
Microsoft Office PowerPoint Viewer TextBytesAtom Record Buffer OverflowMore info here

ExploitDB Exploits

idDescription
2010-09-25Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow

OpenVAS Exploits

DateDescription
2010-02-10Name : Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
File : nvt/secpod_ms10-004.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
62241Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution

Information Assurance Vulnerability Management (IAVM)

DateDescription
2010-02-18IAVM : 2010-A-0028 - Multiple Remote Vulnerabilities in Microsoft Office PowerPoint
Severity : Category II - VMSKEY : V0022682

Snort® IPS/IDS

DateDescription
2017-10-10Microsoft Office PowerPoint invalid TextByteAtom remote code execution attempt
RuleID : 44280 - Revision : 1 - Type : FILE-OFFICE
2017-01-25Microsoft Office PowerPoint improper filename remote code execution attempt
RuleID : 41094 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office PowerPoint out of bounds value remote code execution attempt
RuleID : 36888 - Revision : 2 - Type : FILE-OFFICE
2014-11-16Microsoft Office PowerPoint improper filename remote code execution attempt
RuleID : 31437 - Revision : 2 - Type : FILE-OFFICE
2014-06-07Microsoft Office PowerPoint out of bounds value remote code execution attempt
RuleID : 30941 - Revision : 3 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint TextCharsAtom record buffer overflow attempt
RuleID : 25527 - Revision : 5 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint out of bounds value remote code execution attempt
RuleID : 20590 - Revision : 12 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint TextCharsAtom record buffer overflow attempt
RuleID : 19894 - Revision : 18 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint out of bounds value remote code execution attempt
RuleID : 19303 - Revision : 16 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint improper filename remote code execution attempt
RuleID : 19296 - Revision : 15 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint out of bounds value remote code execution attempt
RuleID : 16421 - Revision : 17 - Type : FILE-OFFICE
2015-05-28Microsoft PowerPoint unbound memcpy and remote code execution attempt
RuleID : 16413 - Revision : 6 - Type : WEB-CLIENT
2014-01-10Microsoft Office PowerPoint invalid TextByteAtom remote code execution attempt
RuleID : 16412 - Revision : 19 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint out of bounds value remote code execution attempt
RuleID : 16411 - Revision : 15 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint file LinkedSlide10Atom record parsing heap corrup...
RuleID : 16410 - Revision : 12 - Type : FILE-OFFICE
2014-01-10Microsoft Office PowerPoint improper filename remote code execution attempt
RuleID : 16409 - Revision : 14 - Type : FILE-OFFICE

Nessus® Vulnerability Scanner

DateDescription
2010-10-20Name : An application installed on the remote Mac OS X host is affected by multiple ...
File : macosx_ms_office_feb2010.nasl - Type : ACT_GATHER_INFO
2010-02-09Name : Arbitrary code can be executed on the remote host through Microsoft PowerPoint.
File : smb_nt_ms10-004.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
CERT http://www.us-cert.gov/cas/techalerts/TA10-040A.html
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10...
SECTRACK http://www.securitytracker.com/id?1023563

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2018-10-13 00:22:53
  • Multiple Updates
2017-09-19 09:23:34
  • Multiple Updates
2016-04-26 19:29:21
  • Multiple Updates
2014-02-17 10:53:05
  • Multiple Updates
2014-01-19 21:26:29
  • Multiple Updates
2013-11-11 12:38:32
  • Multiple Updates
2013-05-10 23:13:55
  • Multiple Updates