Microsoft Office Word Multiple Vulnerabilities ( 13 October 2010 )
RISK: Medium Risk
1. Word Uninitialized Pointer Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles an uninitialized pointer when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
2. Word Boundary Check Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles an improper boundary check when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
3. Word Index Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles index values inside a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
4. Word Stack Overflow Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles stack validation when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
5. Word Return Value Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles return values when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
6. Word Bookmarks Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles bookmarks when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
7. Word Pointer Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles pointers when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
8. Word Heap Overflow Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles malformed records inside a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
9. Word Index Parsing Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles indexes when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
10. Word Parsing Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word parses a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
11. Word Parsing Vulnerability
A remote code execution vulnerability exists in the way that Microsoft Word handles a malformed record when parsing a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Impact
- Remote Code Execution
System / Technologies affected
- Microsoft Office XP Service Pack 3
- Microsoft Word 2002 Service Pack 3 - Microsoft Office 2003 Service Pack 3
- Microsoft Word 2003 Service Pack 3 - Microsoft Office 2007 Service Pack 2
- Microsoft Word 2007 Service Pack 2 - Microsoft Office 2010
- Microsoft Word 2010 - Microsoft Office 2004 for Mac
- Microsoft Office 2008 for Mac
- Open XML File Format Converter for Mac
- Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
- Microsoft Word Viewer
- Microsoft Office Web Apps
- Microsoft Word Web App
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Download locations for this patch
- Microsoft Office XP Service Pack 3
- Microsoft Word 2002 Service Pack 3 - Microsoft Office 2003 Service Pack 3
- Microsoft Word 2003 Service Pack 3 - Microsoft Office 2007 Service Pack 2
- Microsoft Word 2007 Service Pack 2 - Microsoft Office 2010 (32-bit editions)
- Microsoft Word 2010 (32-bit editions) - Microsoft Office 2010 (64-bit editions)
- Microsoft Word 2010 (64-bit editions) - Microsoft Office 2004 for Mac
- Microsoft Office 2008 for Mac
- Open XML File Format Converter for Mac
- Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
- Microsoft Word Viewer
- Microsoft Office Web Apps
- Microsoft Word Web App
Vulnerability Identifier
- CVE-2010-2747
- CVE-2010-2748
- CVE-2010-2750
- CVE-2010-3214
- CVE-2010-3215
- CVE-2010-3216
- CVE-2010-3217
- CVE-2010-3218
- CVE-2010-3219
- CVE-2010-3220
- CVE-2010-3221
Source
Related Link
Share with