// For flags

CVE-2010-1900

Microsoft Office Word sprmCMajority Record Parsing Remote Code Execution Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malformed records in a Word file, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, aka "Word Record Parsing Vulnerability."

Microsoft Office Word 2002 SP3, 2003 SP3, y 2007 SP2; Microsoft Office 2004 y 2008 para Mac; Open XML File Format Converter para Mac; Office Word Viewer; Office Compatibility Pack para Word, Excel, y PowerPoint 2007 File Formats SP2; y Works 9 no manejan adecuadamente los registros mal formados, lo que permite a atacantes remotos ejecutar código de su elección o causar una denegación de servicio (corrupción de memoria) a través de archivos manipulados, también conocido como "Word Record parsing Vulnerability."

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must open a malicious document.
The specific flaw exists in the parsing of sprmCMajority records in a Word document. Due to the lack of parameter checking when processing sprmCMajority sprm groups it is possible to arbitrarily control the amount of data being written to a stack based buffer resulting in a stack overflow vulnerability which can overwrite critical exception structures. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.

*Credits: L.W.Z of team509
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-05-11 CVE Reserved
  • 2010-08-11 CVE Published
  • 2010-09-11 First Exploit
  • 2024-05-16 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Word
Search vendor "Microsoft" for product "Word"
2002
Search vendor "Microsoft" for product "Word" and version "2002"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Word
Search vendor "Microsoft" for product "Word"
2003
Search vendor "Microsoft" for product "Word" and version "2003"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Word
Search vendor "Microsoft" for product "Word"
2007
Search vendor "Microsoft" for product "Word" and version "2007"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Office
Search vendor "Microsoft" for product "Office"
2004
Search vendor "Microsoft" for product "Office" and version "2004"
mac
Affected
Microsoft
Search vendor "Microsoft"
Office
Search vendor "Microsoft" for product "Office"
2008
Search vendor "Microsoft" for product "Office" and version "2008"
mac
Affected
Microsoft
Search vendor "Microsoft"
Open Xml File Format Converter
Search vendor "Microsoft" for product "Open Xml File Format Converter"
*mac
Affected
Microsoft
Search vendor "Microsoft"
Office Compatibility Pack
Search vendor "Microsoft" for product "Office Compatibility Pack"
2007
Search vendor "Microsoft" for product "Office Compatibility Pack" and version "2007"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Office Word Viewer
Search vendor "Microsoft" for product "Office Word Viewer"
*-
Affected
Microsoft
Search vendor "Microsoft"
Works
Search vendor "Microsoft" for product "Works"
9.0
Search vendor "Microsoft" for product "Works" and version "9.0"
-
Affected