Vulnerability Details : CVE-2008-4841
Potential exploit
The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008. NOTE: As of 20081210, it is unclear whether this vulnerability is related to a WordPad issue disclosed on 20080925 with a 2008-crash.doc.rar example, but there are insufficient details to be sure.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2008-4841
- cpe:2.3:a:microsoft:wordpad:*:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:wordpad:unknown:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4841
70.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4841
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-4841
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4841
-
http://www.microsoft.com/technet/security/advisory/960906.mspx
Vendor Advisory
-
http://www.vupen.com/english/advisories/2008/3390
-
http://secunia.com/advisories/32997
Vendor Advisory
-
http://www.securityfocus.com/bid/31399
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6050
-
http://www.us-cert.gov/cas/techalerts/TA09-104A.html
Microsoft Updates for Multiple Vulnerabilities | CISAUS Government Resource
-
http://www.securityfocus.com/bid/32718
-
http://milw0rm.com/sploits/2008-crash.doc.rar
Exploit
-
http://securityreason.com/securityalert/4711
-
https://www.exploit-db.com/exploits/6560
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010
-
http://www.vupen.com/english/advisories/2009/1024
-
http://securitytracker.com/id?1021376
Jump to