CVE-2010-3946
https://notcve.org/view.php?id=CVE-2010-3946
Integer overflow in the PICT image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted PICT image in an Office document, aka "PICT Image Converter Integer Overflow Vulnerability." Desbordamiento de enteros en el convertidor de imágenes PICT en los filtros de gráficos en Microsoft Office XP SP3, Office 2003 SP3 y Office Converter Pack permite a atacantes remotos ejecutar código arbitrario a través de una imagen PICT manipulada en un documento de Office, también conocido como "vulnerabilidad de desbordamiento de enteros en PICT Image Converter" • http://www.securitytracker.com/id?1024887 http://www.us-cert.gov/cas/techalerts/TA10-348A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11967 • CWE-189: Numeric Errors •
CVE-2010-3945
https://notcve.org/view.php?id=CVE-2010-3945
Buffer overflow in the CGM image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted CGM image in an Office document, aka "CGM Image Converter Buffer Overrun Vulnerability." Desbordamiento del búfer en el convertidor de imágenes CGM de los filtros gráficos de Microsoft Office XP SP3, Office 2003 SP3, y Office Converter Pack permite a atacantes remotos ejecutar código de su elección mediante una imagen CGM manipulada en un documento Office. También se conoce como "Vulnerabilidad de Búfer Overrun en el Convertidor de Imágenes de CGM". • http://www.securitytracker.com/id?1024887 http://www.us-cert.gov/cas/techalerts/TA10-348A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12249 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-3336
https://notcve.org/view.php?id=CVE-2010-3336
Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "MSO Large SPID Read AV Vulnerability." Microsoft Office XP SP3, Office 2004 y 2008 para Mac, Office para Mac 2011, y Open XML File Format Converter para Mac permite a atacantes remotos ejecutar código de su elección a través de un documento Office manipulado que provoca una corrupción de memoria, también conocida como "Vulnerabilidad MSO Large SPID Read AV • http://secunia.com/advisories/38521 http://secunia.com/advisories/42144 http://www.securityfocus.com/bid/44660 http://www.securitytracker.com/id?1024705 http://www.us-cert.gov/cas/techalerts/TA10-313A.html http://www.vupen.com/english/advisories/2010/2923 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11947 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-3334
https://notcve.org/view.php?id=CVE-2010-3334
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Office Art Drawing record with crafted msofbtSp records and unspecified flags, which triggers memory corruption, aka "Office Art Drawing Records Vulnerability." Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 y 2008 para Mac, Office para Mac 2011 y Open XML File Format Converter para Mac, permiten a los atacantes remotos ejecutar código arbitrario por medio de un documento de Office que contiene un registro Office Art Drawing con registros msofbtSp especialmente diseñados y flags no especificados, lo que desencadena una corrupción de memoria, también se conoce como "Office Art Drawing Records Vulnerability". • http://secunia.com/advisories/38521 http://secunia.com/advisories/42144 http://secunia.com/secunia_research/2010-4 http://www.securityfocus.com/archive/1/514699/100/0/threaded http://www.securityfocus.com/bid/44656 http://www.securitytracker.com/id?1024705 http://www.us-cert.gov/cas/techalerts/TA10-313A.html http://www.vupen.com/english/advisories/2010/2923 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087 https://oval.cisecurity.org/repository • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-3333 – Microsoft Office Stack-based Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2010-3333
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability." Desbordamiento de búfer basado en pila en Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 y 2008 para Mac, Office para Mac 2011 y Open XML File Format Converter para Mac permite a atacantes remotos ejecutar código de su elección mediante datos RTF manipulados, también conocido como "RTF Stack Buffer Overflow Vulnerability." A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution. • https://www.exploit-db.com/exploits/18334 https://www.exploit-db.com/exploits/17474 https://www.exploit-db.com/exploits/16686 https://www.exploit-db.com/exploits/24526 https://github.com/Sunqiz/CVE-2010-3333-reproduction http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=880 http://secunia.com/advisories/38521 http://secunia.com/advisories/42144 http://securityreason.com/securityalert/8293 http://www.securityfocus.com/bid/44652 http://www.securitytracker.com/id& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •