Overview
- Description
- Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Microsoft Office Buffer Overflow Vulnerability
- Exploit added on
- Jun 8, 2022
- Exploit action due
- Jun 22, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-787
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B" }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E" }, { "criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "0B191155-67F2-4C6E-BD0C-AF5AF6F04BA1" }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69E6B9EB-D3F7-4C57-BF2F-61664E5C2C7D" }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08AF794A-435D-4171-9DBB-EB7FAED96DBA" }, { "criteria": "cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "421ACF1B-1B21-4416-98ED-BAA5C210EAE5" }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5C94F2C-786B-45E4-B80A-FC668D917014" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4B44889-AEEB-4713-A047-C27B802DB257" }, { "criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63" }, { "criteria": "cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4B148CC-6C58-411B-8503-01F3BE1D5906" }, { "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "4BC69733-551E-4535-B851-4A3EF71E98CD" } ], "operator": "OR" } ] } ]