{ "id": "CVE-2008-1092", "sourceIdentifier": "secure@microsoft.com", "published": "2008-03-25T16:44:00.000", "lastModified": "2018-10-30T16:25:28.170", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Buffer overflow in msjet40.dll before 4.0.9505.0 in Microsoft Jet Database Engine allows remote attackers to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008. NOTE: as of 20080513, Microsoft has stated that this is the same issue as CVE-2007-6026." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la biblioteca msjet40.dll anterior a la versi\u00f3n 4.0.9505.0 en el Motor de Base de datos de Microsoft Jet permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo de Word creado, tal y como se explot\u00f3 \u201cin the wild\u201d en marzo de 2008. NOTA: a partir de 20080513, Microsoft ha declarado que este es el mismo problema que el CVE-2007-6026." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8" }, { "vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*", "matchCriteriaId": "644E2E89-F3E3-4383-B460-424D724EE62F" }, { "vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:word:2000:sp3:*:*:*:*:*:*", "matchCriteriaId": "C426AFDD-870F-4CAD-9E93-636714984259" }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*", "matchCriteriaId": "F02894C4-57A7-45FE-B9D2-1A0EE3ABA455" }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:word:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4182673-402A-4801-9A0F-2516EE923DB4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:word:2003_sp3:*:*:*:*:*:*:*", "matchCriteriaId": "EA77105B-D33D-44D1-BBB0-98EC8A59F69F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:word:2007:*:*:*:*:*:*:*", "matchCriteriaId": "A9B12493-4287-4AAD-9A18-D3FC3FCBE172" }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:word:2007_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "1A89CC23-C0B7-4050-AA21-CF74FE9ADE1B" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2", "source": "secure@microsoft.com" }, { "url": "http://www.kb.cert.org/vuls/id/936529", "source": "secure@microsoft.com", "tags": [ "US Government Resource" ] }, { "url": "http://www.microsoft.com/technet/security/advisory/950627.mspx", "source": "secure@microsoft.com" }, { "url": "http://www.securitytracker.com/id?1019686", "source": "secure@microsoft.com" }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028", "source": "secure@microsoft.com" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41380", "source": "secure@microsoft.com" } ] }