Vulnerabilities > CVE-2010-3337 - Unspecified vulnerability in Microsoft Office 2007/2010
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 and CVE-2010-3142.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Msbulletin
bulletin_id | MS10-087 |
bulletin_url | |
date | 2010-11-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2423930 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Microsoft Office Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-087.NASL |
description | The remote Windows host is running a version of Microsoft Office that is affected by several vulnerabilities : - An integer underflow exists in the way the application parses the PowerPoint file format, which could lead to heap corruption and allow for arbitrary code execution when opening a specially crafted PowerPoint file. (CVE-2010-2573) - A stack-based buffer overflow can be triggered when parsing specially crafted RTF files, leading to arbitrary code execution. (CVE-2010-3333) - A memory corruption vulnerability exists in the way the application parses specially crafted Office files containing Office Art Drawing records. (CVE-2010-3334) - A memory corruption vulnerability exists in the way drawing exceptions are handled when opening specially crafted Office files. (CVE-2010-3335) - A memory corruption vulnerability exists in the way the application parses specially crafted Office files. (CVE-2010-3336) - A DLL preloading (aka binary planting) vulnerability exists because the application insecurely looks in its current working directory when resolving DLL dependencies. (CVE-2010-3337) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 50528 |
published | 2010-11-09 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/50528 |
title | MS10-087: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) |
code |
|
Oval
accepted | 2014-06-09T04:00:10.371-04:00 | ||||||||||||||||
class | vulnerability | ||||||||||||||||
contributors |
| ||||||||||||||||
definition_extensions |
| ||||||||||||||||
description | Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 and CVE-2010-3142. | ||||||||||||||||
family | windows | ||||||||||||||||
id | oval:org.mitre.oval:def:11929 | ||||||||||||||||
status | accepted | ||||||||||||||||
submitted | 2010-03-09T13:00:00 | ||||||||||||||||
title | Insecure Library Loading Vulnerability | ||||||||||||||||
version | 25 |
References
- http://www.securitytracker.com/id?1024705
- http://www.securitytracker.com/id?1024705
- http://www.us-cert.gov/cas/techalerts/TA10-313A.html
- http://www.us-cert.gov/cas/techalerts/TA10-313A.html
- http://www.vupen.com/english/advisories/2010/2923
- http://www.vupen.com/english/advisories/2010/2923
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11929
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11929