Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2003-0820
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:microsoft:word:97:sr2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2002:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:sr1a:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:97:sr1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:98:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:works:2001:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:97:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:works:2002:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:sp3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:works:2003:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2002:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:sr1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:works:2004:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:97:*:*:zh:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:97:*:*:ja:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:97:*:*:ko:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:98:*:*:zh:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:98:*:*:ja:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:98:*:*:ko:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:*:*:zh:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:*:*:ja:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:2000:*:*:ko:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:98:sr1:*:ja:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:word:98:sr2:*:ja:*:*:*:* |
Yes
|
- | - |
References
- http://archives.neohapsis.com/archives/bugtraq/2003-10/0163.html
- http://www.securityfocus.com/bid/8835
- http://www.security.nnov.ru/search/document.asp?docid=5243
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13682
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-050