Описание
Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-0848
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-005
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19107
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2348
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2738
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4022
- http://www.kb.cert.org/vuls/id/416001
- http://www.us-cert.gov/cas/techalerts/TA05-039A.html
EPSS
Процентиль: 97%
0.42122
Средний
CVE ID
Связанные уязвимости
nvd
около 21 года назад
Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
EPSS
Процентиль: 97%
0.42122
Средний