2 results (0.010 seconds)

CVSS: 9.3EPSS: 96%CPEs: 11EXPL: 4

The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability." El control ActiveX de Microsoft Office Web Components Spreadsheet (también se conoce como OWC10 u OWC11), distribuido en Office XP SP3 y Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 para 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 y 2006 versión Gold y SP1, y Office Small Business Accounting 2006, de Microsoft, cuando se utiliza en Internet Explorer, permite a los atacantes remotos ejecutar código arbitrario por medio de una llamada diseñada al método msDataSourceObject, tal y como se explotó “in the wild” en julio y agosto de 2009, también se conoce como "Office Web Components HTML Script Vulnerability". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists during the processing of malicious parameters to the routine msDataSourceObject() and results in transfer of control to unallocated memory. This issue can be exploited to execute arbitrary code under the context of the currently logged in user. • https://www.exploit-db.com/exploits/9163 https://www.exploit-db.com/exploits/16537 http://blogs.technet.com/msrc/archive/2009/07/13/microsoft-security-advisory-973472-released.aspx http://blogs.technet.com/srd/archive/2009/07/13/more-information-about-the-office-web-components-activex-vulnerability.aspx http://isc.sans.org/diary.html?storyid=6778 http://trac.metasploit.com/browser/framework3/trunk/modules/exploits/windows/browser/owc_spreadsheet_msdso.rb http://www.microsoft.com/technet/securit • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 86%CPEs: 5EXPL: 0

Buffer overflow in the Works for Windows document converters in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, Office 2007 SP1, and Works 8.5 and 9 allows remote attackers to execute arbitrary code via a crafted Works .wps file that triggers memory corruption, aka "File Converter Buffer Overflow Vulnerability." Desbordamiento de búfer en los conversores de documentos Works para Windows en Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, Office 2007 SP1, y Works v8.5 y v9 permite a atacantes remotos ejecutar código arbitrario a través de un archivo .wps elaborado que provoca la corrupción de memoria , también conocido como "Vulnerabilidad de desbordamiento de buffer en el conversor de ficheros". • http://blogs.technet.com/srd/archive/2009/06/09/ms09-024.aspx http://jvn.jp/en/jp/JVN70858401/index.html http://osvdb.org/54939 http://secunia.com/advisories/35371 http://www.securityfocus.com/bid/35184 http://www.securitytracker.com/id?1022354 http://www.securitytracker.com/id?1022355 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1543 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09- • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •