This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2009-04-15
Product Office Word Last view 2009-06-10
Version 2000 Type Application
Update sp3  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:office_word

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2009-06-10 CVE-2009-0565

Buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a malformed record that triggers memory corruption, aka "Word Buffer Overflow Vulnerability."

9.3 2009-06-10 CVE-2009-0563

Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."

9.3 2009-04-15 CVE-2009-0088

The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability."

9.3 2009-04-15 CVE-2009-0087

Unspecified vulnerability in the Word 6 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and the Word 6 text converter in Microsoft Office Word 2000 SP3 and 2002 SP3; allows remote attackers to execute arbitrary code via a crafted Word 6 file that contains malformed data, aka "WordPad and Office Text Converter Memory Corruption Vulnerability."

CWE : Common Weakness Enumeration

%idName
66% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (1) CWE-20 Improper Input Validation

SAINT Exploits

Description Link
MS Office Word malformed Sprm record buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

id Description
54960 Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
54959 Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
53663 Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack ...
53662 Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corr...

OpenVAS Exploits

id Description
2009-06-10 Name : Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
File : nvt/secpod_ms09-027.nasl
2008-12-12 Name : WordPad and Office Text Converter Memory Corruption Vulnerability (960477)
File : nvt/secpod_ms_wordpad_mult_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2009-A-0032 Multiple Vulnerabilities in WordPad and Office Text Converters
Severity: Category I - VMSKEY: V0018752

Snort® IPS/IDS

Date Description
2014-06-19 Microsoft Office Word WordPerfect converter buffer overflow attempt
RuleID : 31032 - Type : FILE-OFFICE - Revision : 2
2014-06-19 Microsoft Office Word WordPerfect converter buffer overflow attempt
RuleID : 31031 - Type : FILE-OFFICE - Revision : 2
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 28133 - Type : FILE-OFFICE - Revision : 3
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 28132 - Type : FILE-OFFICE - Revision : 3
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 28131 - Type : FILE-OFFICE - Revision : 3
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 28130 - Type : FILE-OFFICE - Revision : 3
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 28129 - Type : FILE-OFFICE - Revision : 3
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 28128 - Type : FILE-OFFICE - Revision : 3
2014-01-10 Microsoft Office WordPad and Office text converters integer underflow attempt
RuleID : 23557 - Type : FILE-OFFICE - Revision : 5
2014-01-10 Microsoft Office WordPad and Office text converters integer underflow attempt
RuleID : 23556 - Type : FILE-OFFICE - Revision : 5
2014-01-10 Microsoft Office WordPad and Office text converters integer underflow attempt
RuleID : 23356 - Type : FILE-OFFICE - Revision : 5
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 17742 - Type : FILE-OFFICE - Revision : 16
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 17691 - Type : FILE-OFFICE - Revision : 11
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 17690 - Type : FILE-OFFICE - Revision : 14
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 15525 - Type : FILE-OFFICE - Revision : 13
2014-01-10 Microsoft Office Word remote code execution attempt
RuleID : 15524 - Type : FILE-OFFICE - Revision : 13
2014-01-10 Microsoft Office WordPad and Office text converters integer underflow attempt
RuleID : 15469 - Type : FILE-OFFICE - Revision : 17
2014-01-10 Microsoft Office WordPad WordPerfect 6.x converter buffer overflow attempt
RuleID : 15466 - Type : FILE-OFFICE - Revision : 13

Nessus® Vulnerability Scanner

id Description
2012-04-20 Name: The remote Mac OS X host appears to have been compromised.
File: macosx_sabpab_trojan.nasl - Type: ACT_GATHER_INFO
2010-10-20 Name: An application installed on the remote Mac OS X host is affected by multiple ...
File: macosx_ms_office_jun2009.nasl - Type: ACT_GATHER_INFO
2009-06-10 Name: Arbitrary code can be executed on the remote host through Microsoft Word.
File: smb_nt_ms09-027.nasl - Type: ACT_GATHER_INFO
2009-04-15 Name: It is possible to execute arbitrary code on the remote Windows host using a t...
File: smb_nt_ms09-010.nasl - Type: ACT_GATHER_INFO