First published: Tue Aug 14 2007(Updated: )
Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft XML Core Services | =3.0 | |
Microsoft XML Core Services | =4.0 | |
Microsoft XML Core Services | =6.0 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =gold | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft XML Core Services | =5.0 | |
Microsoft Expression Web | ||
Microsoft Office | =2003-sp2 | |
Microsoft Office | =2007 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =2007 | |
Microsoft Groove Management Server | =2007 | |
Microsoft SharePoint Portal Server | ||
Microsoft Office Word Viewer | =2003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2223 is considered a critical vulnerability that allows remote code execution.
To mitigate CVE-2007-2223, users should update Microsoft XML Core Services to a patched version.
CVE-2007-2223 affects Microsoft XML Core Services versions 3.0, 4.0, 5.0, and 6.0.
Yes, CVE-2007-2223 can be exploited remotely via the substringData method.
Systems running vulnerable versions of Microsoft XML Core Services and certain related applications are at risk for CVE-2007-2223.