National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2003-0820 Detail

Current Description

Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.

Source:  MITRE      Last Modified:  12/15/2003      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2003-0820
Original release date:
12/15/2003
Last revised:
11/16/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
7.5 HIGH
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://archives.neohapsis.com/archives/bugtraq/2003-10/0163.html Vendor Advisory External Source BUGTRAQ 20031015 Few issues previously unpublished in English
http://www.microsoft.com/technet/security/bulletin/ms03-050.asp Patch; Vendor Advisory External Source MS MS03-050
http://www.security.nnov.ru/search/document.asp?docid=5243 Third Party Advisory External Source MISC http://www.security.nnov.ru/search/document.asp?docid=5243
http://www.securityfocus.com/bid/8835 Patch; Third Party Advisory; VDB Entry; Vendor Advisory External Source BID 8835
https://exchange.xforce.ibmcloud.com/vulnerabilities/13682 Third Party Advisory; VDB Entry External Source XF word-macro-execute-code(13682)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A336 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:336
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A585 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:585
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A586 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:586
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A668 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:668

References to Check Content

Identifier:
oval:org.mitre.oval:def:336
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:336
Identifier:
oval:org.mitre.oval:def:585
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:585
Identifier:
oval:org.mitre.oval:def:586
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:586
Identifier:
oval:org.mitre.oval:def:668
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:668

Technical Details

Vulnerability Type (View All)

Change History 5 change records found - show changes