Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-3336 | First vendor Publication | 2010-11-09 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "MSO Large SPID Read AV Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3336 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11947 | |||
Oval ID: | oval:org.mitre.oval:def:11947 | ||
Title: | MSO Large SPID Read AV Vulnerability | ||
Description: | Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "MSO Large SPID Read AV Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3336 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Microsoft Office XP |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2011-03-04 | Microsoft Word RTF pFragments Stack Buffer Overflow (File Format) |
OpenVAS Exploits
Date | Description |
---|---|
2010-11-10 | Name : Microsoft Office Remote Code Execution Vulnerabilites (2423930) File : nvt/secpod_ms10-087.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69088 | Microsoft Office MSO Large SPID Read AV Remote Code Execution Microsoft Office contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to an error handling a large SPID can be exploited to corrupt memory via a specially crafted file. It may allow execution of arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2018-02-27 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 45557 - Revision : 1 - Type : FILE-OFFICE |
2018-02-27 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 45556 - Revision : 1 - Type : FILE-OFFICE |
2017-08-23 | Microsoft Office RTF parsing remote code execution attempt RuleID : 43679 - Revision : 1 - Type : FILE-OFFICE |
2017-08-23 | Microsoft Office RTF parsing remote code execution attempt RuleID : 43678 - Revision : 1 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 25393 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | DNS request for known malware domain losang.dynamicdns.co.uk RuleID : 25069 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | Win.Trojan.Riler inbound connection RuleID : 25068 - Revision : 2 - Type : MALWARE-CNC |
2014-01-10 | Win.Trojan.Riler variant outbound connection RuleID : 25067 - Revision : 3 - Type : MALWARE-CNC |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 22102 - Revision : 8 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 22101 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 22037 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 22036 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 22035 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel malformed MsoDrawingObject record attempt RuleID : 19260 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed second pfragments field RuleID : 18706 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed second pfragments field RuleID : 18705 - Revision : 11 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed second pfragments field RuleID : 18704 - Revision : 13 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 18703 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 18702 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF malformed pfragments field RuleID : 18680 - Revision : 19 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF parsing remote code execution attempt RuleID : 18310 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office pptimpconv.dll dll-load exploit attempt RuleID : 18071 - Revision : 13 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office pptimpconv.dll dll-load exploit attempt RuleID : 18070 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Art drawing invalid shape identifier attempt RuleID : 18069 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel malformed MsoDrawingObject record attempt RuleID : 18068 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office RTF parsing remote code execution attempt RuleID : 18067 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office embedded Office Art drawings execution attempt RuleID : 18063 - Revision : 11 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-11-09 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_nov2010.nasl - Type : ACT_GATHER_INFO |
2010-11-09 | Name : Arbitrary code can be executed on the remote host through Microsoft Office. File : smb_nt_ms10-087.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:06:58 |
|
2024-11-28 12:22:52 |
|
2021-05-04 12:12:19 |
|
2021-04-22 01:13:05 |
|
2020-05-23 00:26:27 |
|
2018-10-13 00:22:59 |
|
2017-09-19 09:23:56 |
|
2016-04-26 20:04:51 |
|
2014-02-17 10:57:21 |
|
2014-01-19 21:27:09 |
|
2013-05-10 23:32:22 |
|