This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2009-04-15
Product Office Converter Pack Last view 2009-04-15
Version 2003 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:office_converter_pack

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2009-04-15 CVE-2009-0088

The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability."

CWE : Common Weakness Enumeration

%idName
100% (1) CWE-20 Improper Input Validation

Open Source Vulnerability Database (OSVDB)

id Description
53663 Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack ...

OpenVAS Exploits

id Description
2008-12-12 Name : WordPad and Office Text Converter Memory Corruption Vulnerability (960477)
File : nvt/secpod_ms_wordpad_mult_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2009-A-0032 Multiple Vulnerabilities in WordPad and Office Text Converters
Severity: Category I - VMSKEY: V0018752

Snort® IPS/IDS

Date Description
2014-06-19 Microsoft Office Word WordPerfect converter buffer overflow attempt
RuleID : 31032 - Type : FILE-OFFICE - Revision : 2
2014-06-19 Microsoft Office Word WordPerfect converter buffer overflow attempt
RuleID : 31031 - Type : FILE-OFFICE - Revision : 2
2014-01-10 Microsoft Office WordPad WordPerfect 6.x converter buffer overflow attempt
RuleID : 15466 - Type : FILE-OFFICE - Revision : 13

Nessus® Vulnerability Scanner

id Description
2009-04-15 Name: It is possible to execute arbitrary code on the remote Windows host using a t...
File: smb_nt_ms09-010.nasl - Type: ACT_GATHER_INFO