Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-3333 | First vendor Publication | 2010-11-09 |
Vendor | Cve | Last vendor Modification | 2025-02-10 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.8 | ||
Base Score | 7.8 | Environmental Score | 7.8 |
impact SubScore | 5.9 | Temporal Score | 7.8 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3333 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11931 | |||
Oval ID: | oval:org.mitre.oval:def:11931 | ||
Title: | RTF Stack Buffer Overflow Vulnerability | ||
Description: | Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3333 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Microsoft Office XP Microsoft Office 2003 Microsoft Office 2007 Microsoft Office 2010 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Microsoft Office RTF pFragments Property Stack Buffer Overflow | More info here |
ExploitDB Exploits
id | Description |
---|---|
2011-07-03 | MS Office 2010 RTF Header Stack Overflow Vulnerability Exploit |
2011-03-04 | Microsoft Word RTF pFragments Stack Buffer Overflow (File Format) |
OpenVAS Exploits
Date | Description |
---|---|
2010-11-10 | Name : Microsoft Office Remote Code Execution Vulnerabilites (2423930) File : nvt/secpod_ms10-087.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69085 | Microsoft Office RTF Parsing Stack Overflow Microsoft Office contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to a boundary error when parsing a certain control word in RTF (Rich Text Format) formatted content can be exploited to cause a stack-based buffer overflow via a specially crafted file. It may allow execution of arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2018-02-27 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 45557 - Revision : 1 - Type : FILE-OFFICE |
2018-02-27 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 45556 - Revision : 1 - Type : FILE-OFFICE |
2017-08-23 | Microsoft Office RTF parsing remote code execution attempt RuleID : 43679 - Revision : 1 - Type : FILE-OFFICE |
2017-08-23 | Microsoft Office RTF parsing remote code execution attempt RuleID : 43678 - Revision : 1 - Type : FILE-OFFICE |
2014-01-18 | Win.Trojan.Egobot variant outbound connection RuleID : 28989 - Revision : 4 - Type : MALWARE-CNC |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 25393 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | DNS request for known malware domain losang.dynamicdns.co.uk RuleID : 25069 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | Win.Trojan.Riler inbound connection RuleID : 25068 - Revision : 2 - Type : MALWARE-CNC |
2014-01-10 | Win.Trojan.Riler variant outbound connection RuleID : 25067 - Revision : 3 - Type : MALWARE-CNC |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 22102 - Revision : 8 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 22101 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 22037 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 22036 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 22035 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel malformed MsoDrawingObject record attempt RuleID : 19260 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed second pfragments field RuleID : 18706 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed second pfragments field RuleID : 18705 - Revision : 11 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed second pfragments field RuleID : 18704 - Revision : 13 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 18703 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 18702 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 18680 - Revision : 19 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF parsing remote code execution attempt RuleID : 18310 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office pptimpconv.dll dll-load exploit attempt RuleID : 18071 - Revision : 13 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office pptimpconv.dll dll-load exploit attempt RuleID : 18070 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Art drawing invalid shape identifier attempt RuleID : 18069 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel malformed MsoDrawingObject record attempt RuleID : 18068 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF parsing remote code execution attempt RuleID : 18067 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 18063 - Revision : 11 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-11-09 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_nov2010.nasl - Type : ACT_GATHER_INFO |
2010-11-09 | Name : Arbitrary code can be executed on the remote host through Microsoft Office. File : smb_nt_ms10-087.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-11 17:21:38 |
|
2024-12-19 21:21:26 |
|
2024-11-28 23:06:58 |
|
2024-11-28 12:22:52 |
|
2024-07-16 21:27:58 |
|
2021-05-04 12:12:22 |
|
2021-04-22 01:13:05 |
|
2020-05-23 13:16:55 |
|
2020-05-23 00:26:27 |
|
2018-10-13 00:22:59 |
|
2017-09-19 09:23:56 |
|
2016-04-26 20:04:50 |
|
2014-02-17 10:57:20 |
|
2014-01-19 21:27:09 |
|
2013-05-10 23:32:11 |
|