CVE-2010-3333
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."
Published
2010-11-10T03:00:02.087
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 7.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
-
Type: Primary
CWE-787
-
Type: Secondary
CWE-787
Affected Vendors & Products
References
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=880
Broken Link
([email protected])
-
http://secunia.com/advisories/38521
Broken Link
([email protected])
-
http://secunia.com/advisories/42144
Broken Link
([email protected])
-
http://securityreason.com/securityalert/8293
Broken Link
([email protected])
-
http://www.securityfocus.com/bid/44652
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id?1024705
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.us-cert.gov/cas/techalerts/TA10-313A.html
Third Party Advisory, US Government Resource
([email protected])
-
http://www.vupen.com/english/advisories/2010/2923
Broken Link
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087
Patch, Vendor Advisory
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11931
Broken Link
([email protected])
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=880
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/38521
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/42144
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securityreason.com/securityalert/8293
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/44652
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1024705
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.us-cert.gov/cas/techalerts/TA10-313A.html
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2010/2923
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11931
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)