CVE-2010-1900

Microsoft Works - Code Injection

Title source: rule
STIX 2.1

Description

Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malformed records in a Word file, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, aka "Word Record Parsing Vulnerability."

Exploits (1)

exploitdb WORKING POC VERIFIED
by Abysssec · pythondoswindows
https://www.exploit-db.com/exploits/14971

References (3)

Core 3
Core References
US Government Resource third-party-advisory x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA10-222A.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11490

Scores

EPSS 0.4141
EPSS Percentile 97.4%

Details

CWE
CWE-94
Status published
Products (9)
microsoft/office 2004
microsoft/office 2008
microsoft/office_compatibility_pack 2007 sp2
microsoft/office_word_viewer
microsoft/open_xml_file_format_converter
microsoft/word 2002 sp3
microsoft/word 2003 sp3
microsoft/word 2007 sp2
microsoft/works 9.0
Published Aug 11, 2010
Tracked Since Feb 18, 2026