First published: Tue Feb 08 2005(Updated: )
Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | ||
Microsoft Office | =xp-sp1 | |
Microsoft Office | =xp-sp2 | |
Microsoft Office | =xp-sp3 | |
Microsoft PowerPoint 2010 | =2002 | |
Microsoft PowerPoint 2010 | =2002-sp1 | |
Microsoft PowerPoint 2010 | =2002-sp2 | |
Microsoft PowerPoint 2010 | =2002-sp3 | |
Microsoft Project 2013 | =2002 | |
Microsoft Project 2013 | =2002-sp1 | |
Microsoft Visio Standard | =2002 | |
Microsoft Visio Standard | =2002-sp1 | |
Microsoft Visio Standard | =2002-sp2 | |
Microsoft Visio Standard | =2002-sp2 | |
Microsoft Visio Standard | =2002-sp2 | |
Microsoft Office Word | =2002 | |
Microsoft Office Word | =2002-sp1 | |
Microsoft Office Word | =2002-sp2 | |
Microsoft Office Word | =2002-sp3 | |
Microsoft Works Suite | =2002 | |
Microsoft Works Suite | =2003 | |
Microsoft Works Suite | =2004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0848 has been rated as high severity due to the potential for remote code execution.
To fix CVE-2004-0848, you should apply the latest security updates provided by Microsoft for affected software.
CVE-2004-0848 affects Microsoft Office XP, Microsoft Word, Microsoft Visio, Microsoft PowerPoint, and Microsoft Project versions 2002.
CVE-2004-0848 can be exploited via crafted .doc or .rtf files containing long inputs terminated with a null byte or carriage return.
Yes, CVE-2004-0848 allows remote attackers to execute arbitrary code through maliciously crafted files.