Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2003-0347
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 through 6.3 allows remote attackers to execute arbitrary code via a document with a long ID parameter..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:microsoft:visual_basic:6.3:*:sdk:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:visual_basic:5.0:*:sdk:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:visio:2002:*:professional:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:visual_basic:6.2:*:sdk:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:visual_basic:6.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office:xp:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securityfocus.com/bid/8534
- http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0093.html
- http://www.kb.cert.org/vuls/id/804780
- http://secunia.com/advisories/9666
- http://marc.info/?l=bugtraq&m=106262077829157&w=2
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-037