Vulnerabilities > CVE-2008-4841 - Unspecified vulnerability in Microsoft Wordpad Unknown
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008. NOTE: As of 20081210, it is unclear whether this vulnerability is related to a WordPad issue disclosed on 20080925 with a 2008-crash.doc.rar example, but there are insufficient details to be sure.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 4 |
Exploit-Db
description | MS Windows Wordpad .doc File Local Denial of Service PoC. CVE-2008-4841,CVE-2009-0259. Dos exploit for windows platform |
file | exploits/windows/dos/6560.txt |
id | EDB-ID:6560 |
last seen | 2016-02-01 |
modified | 2008-09-25 |
platform | windows |
port | |
published | 2008-09-25 |
reporter | securfrog |
source | https://www.exploit-db.com/download/6560/ |
title | Microsoft Windows Wordpad - .doc File Local Denial of Service PoC |
type | dos |
Msbulletin
bulletin_id | MS09-010 |
bulletin_url | |
date | 2009-04-14T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 960477 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS09-010.NASL |
description | The remote host contains a version of the Microsoft WordPad and/or Microsoft Office text converters that could allow remote code execution if a specially crafted file is opened. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 36148 |
published | 2009-04-15 |
reporter | This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/36148 |
title | MS09-010: Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477) |
code |
|
Oval
accepted | 2014-06-30T04:11:13.782-04:00 | ||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||
description | The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008. NOTE: As of 20081210, it is unclear whether this vulnerability is related to a WordPad issue disclosed on 20080925 with a 2008-crash.doc.rar example, but there are insufficient details to be sure. | ||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:6050 | ||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||
submitted | 2009-04-14T16:00:00 | ||||||||||||||||||||||||||||||||||||||||||||
title | WordPad Word 97 Text Converter Stack Overflow Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||
version | 28 |
Saint
bid | 32718 |
description | Microsoft WordPad Word 97 text converter XST buffer overflow |
id | win_patch_word97 |
osvdb | 50567 |
title | ms_wordpad_word97_conv_xst |
type | client |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 32718 CVE(CAN) ID: CVE-2008-4841 写字板是Windows操作系统中附件所提供的简单文本编辑工具。 对于没有安装Word的用户,可以使用写字板的文本转换器来打开.doc格式文档。如果用户使用转换器打开了特制的.doc、.wri或.rtf格式文档的话,就可能触发内存破坏,导致执行任意代码。目前这个漏洞正在被积极的利用。 Microsoft Windows XP SP3 Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 SP1 Microsoft Windows 2000SP4 Microsoft --------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: <a href=http://www.microsoft.com/technet/security/ target=_blank>http://www.microsoft.com/technet/security/</a> |
id | SSV:4559 |
last seen | 2017-11-19 |
modified | 2008-12-11 |
published | 2008-12-11 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-4559 |
title | Microsoft写字板文件转换器远程代码执行漏洞 |
References
- http://milw0rm.com/sploits/2008-crash.doc.rar
- http://milw0rm.com/sploits/2008-crash.doc.rar
- http://secunia.com/advisories/32997
- http://secunia.com/advisories/32997
- http://securityreason.com/securityalert/4711
- http://securityreason.com/securityalert/4711
- http://securitytracker.com/id?1021376
- http://securitytracker.com/id?1021376
- http://www.microsoft.com/technet/security/advisory/960906.mspx
- http://www.microsoft.com/technet/security/advisory/960906.mspx
- http://www.securityfocus.com/bid/31399
- http://www.securityfocus.com/bid/31399
- http://www.securityfocus.com/bid/32718
- http://www.securityfocus.com/bid/32718
- http://www.us-cert.gov/cas/techalerts/TA09-104A.html
- http://www.us-cert.gov/cas/techalerts/TA09-104A.html
- http://www.vupen.com/english/advisories/2008/3390
- http://www.vupen.com/english/advisories/2008/3390
- http://www.vupen.com/english/advisories/2009/1024
- http://www.vupen.com/english/advisories/2009/1024
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6050
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6050
- https://www.exploit-db.com/exploits/6560
- https://www.exploit-db.com/exploits/6560