Vulnerability Details : CVE-2007-1202
Word (or Word Viewer) in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, 2004 for Mac, and Works Suite 2004, 2005, and 2006 does not properly parse certain rich text "property strings of certain control words," which allows user-assisted remote attackers to trigger heap corruption and execute arbitrary code, aka the "Word RTF Parsing Vulnerability."
Vulnerability category: Execute code
Products affected by CVE-2007-1202
- cpe:2.3:a:microsoft:word:2000:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2004:*:mac:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2003:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2004:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2006:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2005:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1202
56.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-1202
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2007-1202
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-1202
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024
-
http://www.securityfocus.com/archive/1/468871/100/200/threaded
-
http://www.us-cert.gov/cas/techalerts/TA07-128A.html
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1900
-
http://www.securitytracker.com/id?1018013
Patch
-
http://www.osvdb.org/34388
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=525
Patch
-
http://www.vupen.com/english/advisories/2007/1709
Vendor Advisory
-
http://www.kb.cert.org/vuls/id/555489
US Government Resource
-
http://www.securityfocus.com/bid/23836
Patch
Jump to