Vulnerabilities > CVE-2008-2244 - Resource Management Errors vulnerability in Microsoft Office Word 2002

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
CWE-399
critical
nessus

Summary

Microsoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS08-042.NASL
descriptionThe remote host is running a version of Microsoft Word that is subject to a flaw that could allow arbitrary code to be run. An attacker may use this to execute arbitrary code on this host. To succeed, the attacker would have to send a rogue file to a user of the remote computer and have it open it. Then a bug in the word record parsing handler would result in code execution.
last seen2020-06-01
modified2020-06-02
plugin id33871
published2008-08-13
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/33871
titleMS08-042: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (955048)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(33871);
 script_version("1.35");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2008-2244");
 script_bugtraq_id(30124);
 script_xref(name:"MSFT", value:"MS08-042");
 script_xref(name:"MSKB", value:"954463");
 script_xref(name:"MSKB", value:"954464");

 script_name(english:"MS08-042: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (955048)");
 script_summary(english:"Determines the version of WinWord.exe");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Microsoft
Word.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Microsoft Word that is subject
to a flaw that could allow arbitrary code to be run.

An attacker may use this to execute arbitrary code on this host.

To succeed, the attacker would have to send a rogue file to a user of
the remote computer and have it open it.  Then a bug in the word record
parsing handler would result in code execution.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-042");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Word XP and 2003.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"exploited_by_malware", value:"true");
 script_cwe_id(399);

 script_set_attribute(attribute:"vuln_publication_date", value:"2008/07/09");
 script_set_attribute(attribute:"patch_publication_date", value:"2008/08/12");
 script_set_attribute(attribute:"plugin_publication_date", value:"2008/08/13");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_nt_ms02-031.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, "Host/patch_management_checks");

 exit(0);
}

include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("misc_func.inc");
include("audit.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS08-042';
kbs = make_list("954463", "954464");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

port = get_kb_item("SMB/transport");


xp_kb         = '954463';
twokthree_kb  = '954464';

#
# Word
#
list = get_kb_list_or_exit("SMB/Office/Word/*/ProductPath");
foreach item (keys(list))
{
  v = item - 'SMB/Office/Word/' - '/ProductPath';
  if(ereg(pattern:"^10\..*", string:v))
  {
    # Word XP - fixed in 10.0.6846.0
    office_sp = get_kb_item("SMB/Office/XP/SP");
    if (!isnull(office_sp) && office_sp == 3)
    {
      middle =  ereg_replace(pattern:"^10\.0\.([0-9]*)\.[0-9]*$", string:v, replace:"\1");
      if(middle != v && int(middle) < 6846) {
        vuln++;
        hotfix_add_report(bulletin:bulletin, kb:xp_kb);
      }
    }
  }
  else if(ereg(pattern:"^11\..*", string:v))
  {
    # Word 2003 - fixed in 11.0.8227.0 (SP3)
    office_sp = get_kb_item("SMB/Office/2003/SP");
    if (!isnull(office_sp) && (office_sp == 2 || office_sp == 3))
    {
      middle =  ereg_replace(pattern:"^11\.0\.([0-9]*)\.[0-9]*$", string:v, replace:"\1");
      if(middle != v && int(middle) < 8227) {
        vuln++;
        hotfix_add_report(bulletin:bulletin, kb:twokthree_kb);
      }
    }
  }
}
if (vuln)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  exit(0);
}
else audit(AUDIT_HOST_NOT, 'affected');

Oval

accepted2014-02-03T04:04:46.159-05:00
classvulnerability
contributors
  • nameSudhir Gandhe
    organizationSecure Elements, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
  • commentMicrosoft Word 2002 is installed
    ovaloval:org.mitre.oval:def:973
  • commentMicrosoft Word 2003 is installed
    ovaloval:org.mitre.oval:def:475
descriptionMicrosoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc.
familywindows
idoval:org.mitre.oval:def:5897
statusaccepted
submitted2008-08-13T09:28:00
titleWord Record Parsing Vulnerability
version6

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 30124 CVE(CAN) ID: CVE-2008-2244 Microsoft Word是微软Office办公软件套件中的文字处理工具。 Word没有正确地处理文档中的无效智能标签长度值,如果用户打开了带有畸形记录值的特制Word文件,就可能触发内存破坏。成功利用此漏洞的攻击者可以完全控制受影响的系统。攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。 目前这个漏洞正在被名为Trojan.Mdropper的木马积极的利用。 Microsoft Word 2003 SP3 Microsoft Word 2003 SP2 Microsoft Word 2002 SP3 临时解决方法: * 使用Microsoft Office Word 2003 Viewer或Microsoft Office Word 2003 Viewer Service Pack 3打开和查看Microsoft Word文件。 * 不要打开或保存从不受信任来源或从受信任来源意外收到的Microsoft Office文件。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-042)以及相应补丁: MS08-042:Vulnerability in Microsoft Word Could Allow Remote Code Execution (955048) 链接:<a href=http://www.microsoft.com/technet/security/bulletin/MS08-042.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/bulletin/MS08-042.mspx?pf=true</a>
idSSV:3852
last seen2017-11-19
modified2008-08-15
published2008-08-15
reporterRoot
titleMicrosoft Word智能标签无效长度处理内存破坏漏洞(MS08-042)