Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-1901 | First vendor Publication | 2010-08-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly handle unspecified properties in rich text data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Word RTF Parsing Engine Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1901 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11612 | |||
Oval ID: | oval:org.mitre.oval:def:11612 | ||
Title: | Word RTF Parsing Engine Memory Corruption Vulnerability | ||
Description: | Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly handle unspecified properties in rich text data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Word RTF Parsing Engine Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1901 | Version: | 12 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Microsoft Word 2002 Microsoft Word 2003 Microsoft Word 2007 Microsoft Office Word Viewer Microsoft Office Compatibility Pack |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 3 |
SAINT Exploits
Description | Link |
---|---|
Microsoft Office Word RTF Parsing Engine Memory Corruption | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2010-08-11 | Name : Microsoft Office Word Remote Code Execution Vulnerabilities (2269638) File : nvt/secpod_ms10-056.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66995 | Microsoft Office Word RTF Document Control Word Parsing Memory Corruption Microsoft Office Word contains a flaw in the way that Microsoft Office Word parses rich text data. This may allow an attacker to gain the same user rights as the local user. |
Snort® IPS/IDS
Date | Description |
---|---|
2017-09-26 | Microsoft Office Word rich text format invalid field size memory corruption a... RuleID : 44157 - Revision : 1 - Type : FILE-OFFICE |
2016-04-19 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 38267 - Revision : 2 - Type : FILE-OFFICE |
2016-04-19 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 38266 - Revision : 2 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 31845 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 31844 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 31843 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word sprmCMajority record buffer overflow attempt RuleID : 19459 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word sprmCMajority record buffer overflow attempt RuleID : 19458 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 19295 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | rich text format unexpected field type memory corruption attempt RuleID : 18954 - Revision : 13 - Type : FILE-OTHER |
2014-01-10 | rich text format unexpected field type memory corruption attempt RuleID : 18953 - Revision : 13 - Type : FILE-OTHER |
2014-01-10 | Microsoft Office Word HTML linked objects memory corruption attempt RuleID : 17124 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format invalid field size memory corruption a... RuleID : 17123 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 17122 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 17121 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rich text format unexpected field type memory corruptio... RuleID : 17120 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word sprmCMajority SPRM overflow attempt RuleID : 17119 - Revision : 15 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-20 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_aug2010.nasl - Type : ACT_GATHER_INFO |
2010-08-11 | Name : Arbitrary code can be executed on the remote host through Microsoft Word. File : smb_nt_ms10-056.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:52 |
|
2024-11-28 12:22:00 |
|
2021-05-04 12:11:38 |
|
2021-04-22 01:12:13 |
|
2020-05-23 00:25:50 |
|
2018-10-13 00:22:57 |
|
2017-09-19 09:23:48 |
|
2016-04-26 19:49:28 |
|
2014-11-16 21:24:30 |
|
2014-02-17 10:55:34 |
|
2014-01-19 21:26:52 |
|
2013-05-10 23:25:13 |
|