ID CVE-2011-0107
Summary Untrusted search path vulnerability in Microsoft Office XP SP3, Office 2003 SP3, and Office 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Office Component Insecure Library Loading Vulnerability." Per: http://www.microsoft.com/technet/security/Bulletin/MS11-023.mspx Access Vector: Network per "This is a remote code execution vulnerability" Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
    cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
    cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
    cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 12-10-2018 - 21:59)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
msbulletin via4
bulletin_id MS11-023
bulletin_url
date 2011-04-12T00:00:00
impact Remote Code Execution
knowledgebase_id 2489293
knowledgebase_url
severity Important
title Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
oval via4
accepted 2014-05-26T04:00:06.095-04:00
class vulnerability
contributors
  • name Dragos Prisaca
    organization Symantec Corporation
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Microsoft Office XP is installed
    oval oval:org.mitre.oval:def:663
  • comment Microsoft Office 2003 SP3 is installed
    oval oval:org.mitre.oval:def:15626
  • comment Microsoft Office 2007 SP2 is installed
    oval oval:org.mitre.oval:def:15607
description Untrusted search path vulnerability in Microsoft Office XP SP3, Office 2003 SP3, and Office 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Office Component Insecure Library Loading Vulnerability."
family windows
id oval:org.mitre.oval:def:12655
status accepted
submitted 2011-04-12T13:00:00
title Office Component Insecure Library Loading Vulnerability
version 15
refmap via4
bid 47246
cert TA11-102A
misc http://www.fortiguard.com/advisory/FGA-2011-13.html
osvdb 71767
sectrack 1025343
secunia 44015
vupen ADV-2011-0942
Last major update 12-10-2018 - 21:59
Published 13-04-2011 - 18:55
Last modified 12-10-2018 - 21:59
Back to Top