Vulnerability Details : CVE-2008-2463
Public exploit exists!
The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
Products affected by CVE-2008-2463
- cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office2000:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office_2003:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office_xp:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2463
97.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-2463
-
Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download
Disclosure Date: 2008-07-07First seen: 2020-04-26exploit/windows/browser/ms08_041_snapshotviewerThis module allows remote attackers to place arbitrary files on a users file system via the Microsoft Office Snapshot Viewer ActiveX Control. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2008-2463
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-2463
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2463
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6120
-
http://marc.info/?l=bugtraq&m=121915960406986&w=2
-
http://www.microsoft.com/technet/security/advisory/955179.mspx
-
http://www.kb.cert.org/vuls/id/837785
US Government Resource
-
http://www.securitytracker.com/id?1020433
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43613
-
http://www.exploit-db.com/exploits/6124
-
http://www.securityfocus.com/bid/30114
Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download Vulnerability
-
http://www.us-cert.gov/cas/techalerts/TA08-225A.html
US Government Resource
-
http://www.us-cert.gov/cas/techalerts/TA08-189A.html
US Government Resource
-
http://www.vupen.com/english/advisories/2008/2012/references
Jump to