Vulnerability Details : CVE-2007-0208
Microsoft Word in Office 2000 SP3, XP SP3, Office 2003 SP2, Works Suite 2004 to 2006, and Office 2004 for Mac does not correctly check the properties of certain documents and warn the user of macro content, which allows user-assisted remote attackers to execute arbitrary code.
Vulnerability category: Execute code
Products affected by CVE-2007-0208
- cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2004:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2006:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2005:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-0208
57.63%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-0208
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-0208
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-0208
-
http://www.us-cert.gov/cas/techalerts/TA07-044A.html
US Government Resource
-
http://www.securitytracker.com/id?1017639
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A700
-
http://www.osvdb.org/34385
-
http://www.securityfocus.com/bid/22477
-
http://www.vupen.com/english/advisories/2007/0583
Vendor Advisory
Jump to