CVE-2008-3005
https://notcve.org/view.php?id=CVE-2008-3005
Array index vulnerability in Microsoft Office Excel 2000 SP3 and 2002 SP3, and Office 2004 and 2008 for Mac allows remote attackers to execute arbitrary code via an Excel file with a crafted array index for a FORMAT record, aka the "Excel Index Array Vulnerability." La vulnerabilidad del índice de matriz en Microsoft Office Excel 2000 SP3 y 2002 SP3, y Office 2004 y 2008 para Mac permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo de Excel con un índice de matriz creado para un registro FORMAT, también se conoce como "Excel Index Array Vulnerability." • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=741 http://marc.info/?l=bugtraq&m=121915960406986&w=2 http://secunia.com/advisories/31454 http://www.securityfocus.com/bid/30639 http://www.securitytracker.com/id?1020671 http://www.us-cert.gov/cas/techalerts/TA08-225A.html http://www.vupen.com/english/advisories/2008/2347 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 https://oval.cisecurity.org/repository/search/definition/oval • CWE-20: Improper Input Validation •
CVE-2008-3006 – Microsoft Excel COUNTRY Record Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2008-3006
Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 Gold and SP3; Office Excel Viewer; Office Compatibility Pack 2007 Gold and SP1; Office SharePoint Server 2007 Gold and SP1; and Office 2004 and 2008 for Mac do not properly parse Country record values when loading Excel files, which allows remote attackers to execute arbitrary code via a crafted Excel file, aka the "Excel Record Parsing Vulnerability." Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP2 y SP3, y 2007 Gold y SP1; Office Excel Viewer 2003 Gold y SP3; Office Excel Viewer; Paquete de compatibilidad de Office 2007 Gold y SP1; Office SharePoint Server 2007 Gold y SP1; y Office 2004 y 2008 para Mac no analizan apropiadamente los valores de registro Country al cargar archivos de Excel, lo que permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo de Excel creado, también se conoce como "Excel Record Parsing Vulnerability." This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. Exploitation requires that the attacker coerce the target into opening a malicious .XLS file. The specific flaw exists within the parsing of the BIFF file format used by Microsoft Excel. During the processing of a malformed Country (0x8c) record, user-supplied data may be used in a memory copy operation resulting in memory corruption. • http://marc.info/?l=bugtraq&m=121915960406986&w=2 http://secunia.com/advisories/31454 http://secunia.com/advisories/31455 http://www.securityfocus.com/archive/1/495428/100/0/threaded http://www.securityfocus.com/bid/30640 http://www.securitytracker.com/id?1020672 http://www.us-cert.gov/cas/techalerts/TA08-225A.html http://www.vupen.com/english/advisories/2008/2347 http://www.zerodayinitiative.com/advisories/ZDI-08-048 https://docs.microsoft.com/en-us/security-updates • CWE-399: Resource Management Errors •
CVE-2008-3021 – Microsoft Windows Graphics Rendering Engine PICT Heap Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2008-3021
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote attackers to execute arbitrary code via a crafted PICT file with an invalid bits_per_pixel field, aka the "PICT Filter Parsing Vulnerability," a different vulnerability than CVE-2008-3018. Office 2000 SP3, XP SP3 y 2003 SP2; Office Converter Pack; y Works versión 8 de Microsoft, no analizan apropiadamente la longitud de un archivo PICT, lo que permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo PICT diseñado con un campo bits_per_pixel no válido, también se conoce como la "PICT Filter Parsing Vulnerability" una vulnerabilidad diferente de CVE-2008-3018. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must open a malicious file. The specific flaw exists in the handling of PICT images in an office document. Due to improper parsing of the bits_per_pixel field in a PICT image a heap overflow can occur. • http://marc.info/?l=bugtraq&m=121915960406986&w=2 http://secunia.com/advisories/31336 http://www.securityfocus.com/archive/1/495429/100/0/threaded http://www.securityfocus.com/bid/30598 http://www.securitytracker.com/id?1020673 http://www.us-cert.gov/cas/techalerts/TA08-225A.html http://www.vupen.com/english/advisories/2008/2348 http://www.zerodayinitiative.com/advisories/ZDI-08-049 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 https:/ • CWE-399: Resource Management Errors •
CVE-2008-2463 – Microsoft Access - 'Snapview.ocx 10.0.5529.0' ActiveX Remote File Download
https://notcve.org/view.php?id=CVE-2008-2463
The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder. El control ActiveX Microsoft Office Snapshot Viewer en snapview.ocx, distribuido en Snapshot Viewer and Microsoft Office Access 2000 through 2003, permite a atacantes remotos descargar archivos de su elección a un equipo cliente a través de un documento HTML o mensaje de correo manipulados. NOTA: esto puede ser aprovechado para ejecutar código si se escribe la carpeta de inicio (StartUp). • https://www.exploit-db.com/exploits/6124 https://www.exploit-db.com/exploits/16605 http://marc.info/?l=bugtraq&m=121915960406986&w=2 http://secunia.com/advisories/30883 http://www.exploit-db.com/exploits/6124 http://www.kb.cert.org/vuls/id/837785 http://www.microsoft.com/technet/security/advisory/955179.mspx http://www.securityfocus.com/bid/30114 http://www.securitytracker.com/id?1020433 http://www.us-cert.gov/cas/techalerts/TA08-189A.html http://www.us • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2008-3068
https://notcve.org/view.php?id=CVE-2008-3068
Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension. Microsoft Crypto API 5.131.2600.2180 hasta la 6.0, como las usadas en Outlook, Windows Live Mail, y Office 2007, realiza una lista de revocación de certificado (CRL) utilizando una URL arbitraria de un certificado incluido en (1) mensaje de correo electrónico S/MIME o (2) documento firmado, lo que permite a atacantes remotos conseguir tiempos de lectura y direcciones IP de recipientes, y resultados de escaneo de puerto, a través de un certificado manipulado con una extensión de de una Authority Information Access (AIA). • http://securityreason.com/securityalert/3978 http://www.securityfocus.com/archive/1/493947/100/0/threaded http://www.securityfocus.com/archive/1/494101/100/0/threaded http://www.securityfocus.com/bid/28548 http://www.securitytracker.com/id?1019736 http://www.securitytracker.com/id?1019737 http://www.securitytracker.com/id?1019738 https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt https://www.cynops.de/advisories/AK •