First published: Wed Sep 10 2008(Updated: )
Argument injection vulnerability in a URI handler in Microsoft Office XP SP3, 2003 SP2 and SP3, 2007 Office System Gold and SP1, and Office OneNote 2007 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted onenote:// URL, aka "Uniform Resource Locator Validation Error Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =xp-sp3 | |
Microsoft Office | =2003-sp2 | |
Microsoft OneNote for Mac | =2007-gold | |
Microsoft OneNote for Mac | =2007-sp1 | |
Microsoft Office | =2007-sp1 | |
Microsoft Office | =2007 | |
Microsoft Office | =2003-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3007 has a high severity rating as it allows remote attackers to execute arbitrary code.
To mitigate CVE-2008-3007, users should apply the latest security patches provided by Microsoft for the affected Office versions.
CVE-2008-3007 affects Microsoft Office XP SP3, 2003 SP2 and SP3, and 2007 Office System including OneNote 2007.
CVE-2008-3007 facilitates a remote code execution attack via crafted onenote:// URLs.
Exploitation of CVE-2008-3007 typically requires user interaction, such as clicking a malicious link.