CVE-2009-0088
https://notcve.org/view.php?id=CVE-2009-0088
The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability." El conversor WordPerfect 6.x en Microsoft Office Word 2000 SP3 y Microsoft Office Converter Pack no valida adecuadamente la longitud de una cadena no especificada, lo cual permite a atacantes remotos ejecutar código de su elección a través de un fichero WordPerfect 6.x manipulado, también conocido como "Vulnerabilidad de corrupción de pila en el conversor Word 2000 WordPerfect 6.x". • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=782 http://osvdb.org/53663 http://www.securitytracker.com/id?1022043 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1024 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5736 • CWE-20: Improper Input Validation •
CVE-2009-0098
https://notcve.org/view.php?id=CVE-2009-0098
Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability." Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2 y Exchange Server 2007 SP1; no interpreta adecuadamente las propiedades de Transport Neutral Encapsulation (TNEF), esto permite a atacantes remotos ejecutar código de su elección a través de un mensaje TNEF manipulado. También se conoce como "Vulnerabilidad de Corrupción de Memoria". • http://osvdb.org/51837 http://secunia.com/advisories/33838 http://www.us-cert.gov/cas/techalerts/TA09-041A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6114 • CWE-399: Resource Management Errors •
CVE-2009-0099
https://notcve.org/view.php?id=CVE-2009-0099
The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability." El proveedor Electronic Messaging System Microsoft Data Base (EMSMDB32) en Microsoft Exchange 2000 Server SP3 y Exchange Server 2003 SP2, utilizado como Exchange System Attendant, permite a atacantes remotos producir una denegación de servicio (caída de la aplicación) a través de una comando MAPI malformado, también conocido como "vulnerabilidad de procesado literal". • http://osvdb.org/51838 http://secunia.com/advisories/33838 http://www.us-cert.gov/cas/techalerts/TA09-041A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6159 • CWE-20: Improper Input Validation •
CVE-2008-4037 – Microsoft Windows - SMB Relay Code Execution (MS08-068)
https://notcve.org/view.php?id=CVE-2008-4037
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834. Se presenta una vulnerabilidad en Microsoft Windows 2000 Gold hasta SP4, XP Gold hasta SP3, Server 2003 SP1 y SP2, Vista Gold y SP1, y Server 2008 permite a los servidores SMB remotos ejecutar código arbitrario en una maquina cliente mediante la reproducción de las credenciales NTLM de un usuario cliente, como se demuestra. por backrush, también se conoce como "SMB Credential Reflection Vulnerability." . NOTA: algunas fuentes confiables informan que esta vulnerabilidad existe debido a una corrección insuficiente para CVE-2000-0834. • https://www.exploit-db.com/exploits/16360 https://www.exploit-db.com/exploits/7125 https://www.exploit-db.com/exploits/20 http://marc.info/?l=bugtraq&m=122703006921213&w=2 http://osvdb.org/49736 http://secunia.com/advisories/32633 http://securitytracker.com/id?1021163 http://www.networkworld.com/news/2008/111208-microsoft-seven-year-security-patch.html http://www.securityfocus.com/bid/7385 http://www.securityfocus.com/data/vulnerabilities/exploits/backrush.patch http:// • CWE-287: Improper Authentication •
CVE-2008-4033 – Microsoft XML Core Services DTD - Cross-Domain Scripting (MS08-069)
https://notcve.org/view.php?id=CVE-2008-4033
Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability." Vulnerabilidad de dominios cruzados en Microsoft XML Core Services v3.0 hasta v6.0, como el que se utiliza en Microsoft Expression Web, Office, Internet Explorer y otros productos; permite a atacantes remotos obtener información sensible de otro dominio y corromper el estado de la sesión a través de solicitudes de campos de cabecera HTTP, como se ha demostrado con el campo Transfer-Encoding. También se conoce como "Vulnerabilidad de la solicitud de la cabecera MSXML". • https://www.exploit-db.com/exploits/7196 http://marc.info/?l=bugtraq&m=122703006921213&w=2 http://securitytracker.com/id?1021164 http://www.securityfocus.com/bid/32204 http://www.us-cert.gov/cas/techalerts/TA08-316A.html http://www.vupen.com/english/advisories/2008/3111 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5847 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •