First published: Wed Apr 15 2009(Updated: )
The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office Converter Pack | =2003 | |
Microsoft Office Word | =2000-sp3 | |
Microsoft Office Word | =2002-sp3 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0088 has a critical severity rating due to its potential to allow remote code execution.
To fix CVE-2009-0088, users should ensure that their Microsoft Office software is updated to the latest service pack.
CVE-2009-0088 affects Microsoft Office Word 2000 SP3, Microsoft Office Converter Pack 2003, and several versions of Windows including Windows XP and Windows Server 2003.
Yes, CVE-2009-0088 can be exploited remotely through specially crafted WordPerfect 6.x files.
CVE-2009-0088 can enable attackers to execute arbitrary code on the affected systems.