Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-1900 | First vendor Publication | 2010-08-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malformed records in a Word file, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, aka "Word Record Parsing Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1900 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11490 | |||
Oval ID: | oval:org.mitre.oval:def:11490 | ||
Title: | Word Record Parsing Vulnerability | ||
Description: | Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malformed records in a Word file, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, aka "Word Record Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1900 | Version: | 12 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Microsoft Word 2002 Microsoft Word 2003 Microsoft Word 2007 Microsoft Office Word Viewer Microsoft Office Compatibility Pack Microsoft Works 9 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 3 | |
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2010-09-11 | MOAUB #11 - Microsoft Office Word 2007 sprmCMajority Buffer Overflow |
OpenVAS Exploits
Date | Description |
---|---|
2010-08-11 | Name : Microsoft Office Word Remote Code Execution Vulnerabilities (2269638) File : nvt/secpod_ms10-056.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66994 | Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution Microsoft Office Word contains a flaw in the way that it handles malformed records inside a specially crafted Word file. This may allow an attacker to take complete control of an affected system. |
Snort® IPS/IDS
Date | Description |
---|---|
2017-09-26 | Microsoft Office Word rich text format invalid field size memory corruption a... RuleID : 44157 - Revision : 1 - Type : FILE-OFFICE |
2016-04-19 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 38267 - Revision : 2 - Type : FILE-OFFICE |
2016-04-19 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 38266 - Revision : 2 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 31845 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 31844 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 31843 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word sprmCMajority record buffer overflow attempt RuleID : 19459 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word sprmCMajority record buffer overflow attempt RuleID : 19458 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 19295 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | rich text format unexpected field type memory corruption attempt RuleID : 18954 - Revision : 13 - Type : FILE-OTHER |
2014-01-10 | rich text format unexpected field type memory corruption attempt RuleID : 18953 - Revision : 13 - Type : FILE-OTHER |
2014-01-10 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 17124 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format invalid field size memory corruption a... RuleID : 17123 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 17122 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 17121 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 17120 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word sprmCMajority SPRM overflow attempt RuleID : 17119 - Revision : 15 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-20 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_aug2010.nasl - Type : ACT_GATHER_INFO |
2010-08-11 | Name : Arbitrary code can be executed on the remote host through Microsoft Word. File : smb_nt_ms10-056.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:52 |
|
2024-11-28 12:22:00 |
|
2021-05-04 12:11:37 |
|
2021-04-22 01:12:13 |
|
2020-05-23 00:25:50 |
|
2018-10-13 00:22:57 |
|
2017-09-19 09:23:48 |
|
2016-04-26 19:49:28 |
|
2014-02-17 10:55:34 |
|
2014-01-19 21:26:52 |
|
2013-05-10 23:25:13 |
|