Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Microsoft Office Publisher Could Allow Remote Code Execution (947085) |
Informations | |||
---|---|---|---|
Name | MS08-012 | First vendor Publication | 2008-02-12 |
Vendor | Microsoft | Last vendor Modification | 2008-09-10 |
Severity (Vendor) | Critical | Revision | 1.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.2 (September 10, 2008): Bulletin updated to add FAQ entry to clarify why non-vulnerable versions of Microsoft Office can be offered this update.Summary: This critical security update resolves two privately reported vulnerabilities in Microsoft Office Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS08-012.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-399 | Resource Management Errors |
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:4547 | |||
Oval ID: | oval:org.mitre.oval:def:4547 | ||
Title: | Word Memory Corruption Vulnerability | ||
Description: | Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, aka "Publisher Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-0104 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Publisher 2000 Microsoft Publisher 2002 Microsoft Publisher 2003 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:5305 | |||
Oval ID: | oval:org.mitre.oval:def:5305 | ||
Title: | Publisher Invalid Memory Reference Vulnerability | ||
Description: | Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, related to invalid "memory values," aka "Publisher Invalid Memory Reference Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-0102 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Publisher 2000 Microsoft Publisher 2002 Microsoft Publisher 2003 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 4 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
41447 | Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitra... |
41446 | Microsoft Office Publisher .pub File Handling Arbitrary Code Execution |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Office Publisher invalid pathname overwrite attempt RuleID : 13471 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Publisher memory corruption attempt RuleID : 13470 - Revision : 21 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-02-12 | Name : Arbitrary code can be executed on the remote host through Microsoft Publisher. File : smb_nt_ms08-012.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:54 |
|
2014-01-19 21:30:10 |
|
2013-05-11 00:49:18 |
|