Vulnerabilities > CVE-2007-0033 - Unspecified vulnerability in Microsoft Office and Outlook
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Microsoft Outlook 2002 and 2003 allows user-assisted remote attackers to execute arbitrary code via a malformed VEVENT record in an .iCal meeting request or ICS file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-003.NASL |
description | The remote host is running a version of outlook or exchange that is vulnerable to a bug in the VEVENT record handling routine that could allow an attacker execute arbitrary code on the remote host by sending a specially crafted email. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23999 |
published | 2007-01-09 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23999 |
title | MS07-003: Vulnerabilities in Microsoft Outlook Could Allow Remote Code Execution (925938) |
code |
|
Oval
accepted | 2012-05-28T04:01:48.913-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Microsoft Outlook 2002 and 2003 allows user-assisted remote attackers to execute arbitrary code via a malformed VEVENT record in an .iCal meeting request or ICS file. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:516 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2007-01-10T02:08:37 | ||||||||||||
title | Microsoft Outlook VEVENT Vulnerability | ||||||||||||
version | 7 |
References
- http://www.kb.cert.org/vuls/id/476900
- http://www.securityfocus.com/bid/21931
- http://securitytracker.com/id?1017488
- http://secunia.com/advisories/23674
- http://www.us-cert.gov/cas/techalerts/TA07-009A.html
- http://www.osvdb.org/31252
- http://www.vupen.com/english/advisories/2007/0104
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A516
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003
- http://www.securityfocus.com/archive/1/457274/100/0/threaded