Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2002-09-24 |
Product | Office Web Components | Last view | 2012-08-14 |
Version | 2003 | Type | |
Update | sp3 | ||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2012-08-14 | CVE-2012-1856 | The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability." |
9.3 | 2012-04-10 | CVE-2012-0158 | The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability." |
9.3 | 2009-08-12 | CVE-2009-2496 | Heap-based buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Office Web Components Heap Corruption Vulnerability." |
9.3 | 2009-08-12 | CVE-2009-1534 | Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka "Office Web Components Buffer Overflow Vulnerability." |
9.3 | 2009-08-12 | CVE-2009-0562 | The Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 does not properly allocate memory, which allows remote attackers to execute arbitrary code via unspecified vectors that trigger "system state" corruption, aka "Office Web Components Memory Allocation Vulnerability." |
9.3 | 2009-07-15 | CVE-2009-1136 | The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability." |
9.3 | 2006-12-31 | CVE-2006-4695 | Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote attackers to execute arbitrary code via a crafted URL, aka "Office Web Components URL Parsing Vulnerability." |
5 | 2002-12-18 | CVE-2002-1340 | The "ConnectionFile" property in the DataSourceControl component in Office Web Components (OWC) 10 allows remote attackers to determine the existence of local files by detecting an exception. |
5 | 2002-12-18 | CVE-2002-1339 | The "XMLURL" property in the Spreadsheet component of Office Web Components (OWC) 10 follows redirections, which allows remote attackers to determine the existence of local files based on exceptions, or to read WorkSheet XML files. |
5 | 2002-12-18 | CVE-2002-1338 | The Load method in the Chart component of Office Web Components (OWC) 9 and 10 generates an exception when a specified file does not exist, which allows remote attackers to determine the existence of local files. |
7.5 | 2002-09-24 | CVE-2002-0861 | Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to bypass the "Allow paste operations via script" setting, even when it is disabled, via the (1) Copy method of the Cell object or (2) the Paste method of the Range object. |
5 | 2002-09-24 | CVE-2002-0860 | The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file. |
7.5 | 2002-09-24 | CVE-2002-0727 | The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
57% (4) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
28% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
14% (1) | CWE-399 | Resource Management Errors |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:14227 | Office Web Components URL Parsing Vulnerability |
oval:org.mitre.oval:def:5809 | Office Web Components HTML Script Vulnerability |
oval:org.mitre.oval:def:6337 | Office Web Components Memory Allocation Vulnerability |
oval:org.mitre.oval:def:6326 | Office Web Components Buffer Overflow Vulnerability |
oval:org.mitre.oval:def:5645 | Office Web Components Heap Corruption Vulnerability |
oval:org.mitre.oval:def:15462 | MSCOMCTL.OCX RCE Vulnerability |
oval:org.mitre.oval:def:15447 | MSCOMCTL.OCX RCE Vulnerability - MS12-060 |
SAINT Exploits
Description | Link |
---|---|
Microsoft Office Web Components OWC.Spreadsheet.9 ActiveX Control overflow | More info here |
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability | More info here |
Microsoft Office Web Components OWC.Spreadsheet Evaluate method vulnerability | More info here |
Microsoft Office Web Components OWC.Spreadsheet.9 HTMLURL property overflow | More info here |
Microsoft Office Web Components DataSourceControl ActiveX Control memory allocation | More info here |
Microsoft Office Web Components OWC.Spreadsheet BorderAround vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
56916 | Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object ... |
56915 | Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Meth... |
56914 | Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Alloca... |
55806 | Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject(... |
42711 | Microsoft Office Web Components URL Parsing Arbitrary Code Execution |
3011 | Microsoft IE OWC ConnectionFile File Existence Verification |
3010 | Microsoft IE OWC XMLURL File Existence Verification |
3009 | Microsoft IE OWC Load File Existence Verification |
3008 | Microsoft IE OWC Cut/Paste Data Read and Injection |
3007 | Microsoft IE OWC LoadText Read Arbitrary File |
3006 | Microsoft IE OWC Script Execution |
OpenVAS Exploits
id | Description |
---|---|
2012-08-15 | Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573) File : nvt/secpod_ms12-060.nasl |
2012-04-11 | Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258) File : nvt/secpod_ms12-027.nasl |
2009-07-18 | Name : Microsoft Office Web Components ActiveX Control Code Execution Vulnerability File : nvt/gb_ms_office_web_compnts_actvx_code_exec_vuln.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2012-A-0132 | Microsoft Windows Common Controls Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0033659 |
2012-A-0059 | Microsoft Windows Common Controls Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0031982 |
2009-A-0069 | Multiple Vulnerabilities in Microsoft Office Web Components Severity: Category II - VMSKEY: V0019877 |
2008-A-0015 | Microsoft Office Web Components Remote Code Execution Vulnerabilities Severity: Category II - VMSKEY: V0015760 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Office Data Source Control 10.0 ActiveX clsid unicode access RuleID : 7877 - Type : WEB-ACTIVEX - Revision : 10 |
2014-01-10 | Microsoft Office Data Source Control 10.0 ActiveX clsid access RuleID : 7876 - Type : BROWSER-PLUGINS - Revision : 18 |
2014-01-10 | Microsoft Office PivotTable 10.0 ActiveX CLSID unicode access RuleID : 7875 - Type : WEB-ACTIVEX - Revision : 7 |
2014-01-10 | Microsoft Office PivotTable 10.0 ActiveX clsid access RuleID : 7874 - Type : BROWSER-PLUGINS - Revision : 12 |
2014-01-10 | Microsoft Office Spreadsheet 10.0 ActiveX clsid unicode access RuleID : 7873 - Type : WEB-ACTIVEX - Revision : 9 |
2014-01-10 | Microsoft Office Spreadsheet 10.0 ActiveX clsid access RuleID : 7872 - Type : BROWSER-PLUGINS - Revision : 17 |
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49496 - Type : FILE-OFFICE - Revision : 1 |
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49494 - Type : FILE-OFFICE - Revision : 1 |
2017-09-19 | RTF obfuscation string RuleID : 43990 - Type : INDICATOR-OBFUSCATION - Revision : 3 |
2017-09-19 | newlines embedded in rtf header RuleID : 43989 - Type : INDICATOR-OBFUSCATION - Revision : 3 |
2014-01-10 | Microsoft Office 2000 and 2002 Web Components Record Navigation Control Activ... RuleID : 4178 - Type : BROWSER-PLUGINS - Revision : 12 |
2014-01-10 | Microsoft Office Web Components OWC.Spreadsheet.9 ActiveX clsid access attempt RuleID : 4177 - Type : BROWSER-PLUGINS - Revision : 20 |
2014-01-10 | Microsoft Office 2000 and 2002 Web Components Chart ActiveX object access RuleID : 4176 - Type : BROWSER-PLUGINS - Revision : 12 |
2014-01-10 | Microsoft Office 2000/2002 Web Components PivotTable ActiveX object access RuleID : 4175 - Type : BROWSER-PLUGINS - Revision : 12 |
2014-01-10 | Microsoft Office 2000 and 2002 Web Components Data Source Control ActiveX cls... RuleID : 4170 - Type : BROWSER-PLUGINS - Revision : 19 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32863 - Type : FILE-OFFICE - Revision : 4 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32862 - Type : FILE-OFFICE - Revision : 3 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32861 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32860 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32859 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32858 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32857 - Type : FILE-OFFICE - Revision : 2 |
2015-01-06 | Microsoft Office Web Components OWC.Spreadsheet.9 ActiveX clsid access attempt RuleID : 32642 - Type : BROWSER-PLUGINS - Revision : 2 |
2014-11-16 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 31927 - Type : FILE-OFFICE - Revision : 2 |
2014-11-16 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 31926 - Type : FILE-OFFICE - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-08-15 | Name: The remote Windows host has a code execution vulnerability. File: smb_nt_ms12-060.nasl - Type: ACT_GATHER_INFO |
2012-04-11 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms12-027.nasl - Type: ACT_GATHER_INFO |
2009-08-11 | Name: Arbitrary code can be executed on the remote host through Microsoft Office We... File: smb_nt_ms09-043.nasl - Type: ACT_GATHER_INFO |
2009-07-14 | Name: The remote Windows host contains an ActiveX control that could allow remote c... File: smb_kb_973472.nasl - Type: ACT_GATHER_INFO |
2008-03-11 | Name: Arbitrary code can be executed on the remote host through Microsoft Office We... File: smb_nt_ms08-017.nasl - Type: ACT_GATHER_INFO |