Vulnerability Details : CVE-2008-1898
Public exploit exists!
A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call.
Vulnerability category: Input validationExecute codeDenial of service
Products affected by CVE-2008-1898
- cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:7.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1898
96.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-1898
-
Microsoft Works 7 WkImgSrv.dll WKsPictureInterface() ActiveX Code Execution
Disclosure Date: 2008-11-28First seen: 2020-04-26exploit/windows/fileformat/msworks_wkspictureinterfaceThe Microsoft Works ActiveX control (WkImgSrv.dll) could allow a remote attacker to execute arbitrary code on a system. By passing a negative integer to the WksPictureInterface method, an attacker could execute arbitrary code on the system with privileges of the vi
CVSS scores for CVE-2008-1898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-1898
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1898
-
https://www.exploit-db.com/exploits/5530
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41876
-
https://www.exploit-db.com/exploits/5460
-
http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0029.html
Exploit
-
http://blogs.technet.com/swi/archive/2008/06/05/why-there-wont-be-a-security-update-for-wkimgsrv-dll.aspx
-
http://www.securityfocus.com/archive/1/491027/100/0/threaded
-
http://www.securityfocus.com/bid/28820
Exploit
Jump to