← Voltar para CVEs
CVE-2010-3333
HIGHCISA KEV7.8
Descricao
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado11/10/2010
Ultima modificacao4/22/2026
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorMicrosoft
ProdutoOffice
Nome da vulnerabilidadeMicrosoft Office Stack-based Buffer Overflow Vulnerability
Data inclusao KEV2022-03-03
Prazo de remediacao2022-03-24
Uso em ransomwareUnknown
Produtos afetados
microsoft:officemicrosoft:open_xml_file_format_converter
Fraquezas (CWE)
CWE-787CWE-787
Referencias
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=880(secure@microsoft.com)
http://secunia.com/advisories/38521(secure@microsoft.com)
http://secunia.com/advisories/42144(secure@microsoft.com)
http://securityreason.com/securityalert/8293(secure@microsoft.com)
http://www.securityfocus.com/bid/44652(secure@microsoft.com)
http://www.securitytracker.com/id?1024705(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA10-313A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2010/2923(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11931(secure@microsoft.com)
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=880(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38521(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42144(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/8293(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/44652(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024705(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA10-313A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/2923(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11931(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-3333(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.