First published: Wed Nov 10 2010(Updated: )
A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Open XML File Format Converter | ||
Microsoft Office | =2008 | |
Microsoft Office | =2004 | |
Microsoft Office | =xp-sp3 | |
Microsoft Office | =2007-sp2 | |
Microsoft Office | =2011 | |
Microsoft Office | =2010 | |
Microsoft Office | =2003-sp3 | |
Microsoft Office | ||
Microsoft Office | =2004 | |
Microsoft Office | =2008 | |
Microsoft Office | =2011 | |
Microsoft Open XML File Format Converter | ||
=2003-sp3 | ||
=2004 | ||
=2007-sp2 | ||
=2008 | ||
=2010 | ||
=2011 | ||
=xp-sp3 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3333 has been categorized with a critical severity level due to the potential for remote code execution.
To fix CVE-2010-3333, users should apply the latest patches and updates provided by Microsoft for the affected Office versions.
CVE-2010-3333 affects multiple versions of Microsoft Office including Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, and several versions for Mac.
CVE-2010-3333 is a stack-based buffer overflow vulnerability occurring in the parsing of RTF data.
By exploiting CVE-2010-3333, an attacker can perform remote code execution, potentially taking control of the affected system.