Vulnerability Description
Argument injection vulnerability in a URI handler in Microsoft Office XP SP3, 2003 SP2 and SP3, 2007 Office System Gold and SP1, and Office OneNote 2007 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted onenote:// URL, aka "Uniform Resource Locator Validation Error Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Office | 2003 |
| Microsoft | Office Onenote | 2007 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=122235754013992&w=2
- http://www.insomniasec.com/advisories/ISVA-080910.1.htm
- http://www.securityfocus.com/archive/1/496178/100/0/threaded
- http://www.securityfocus.com/bid/31067
- http://www.securitytracker.com/id?1020833
- http://www.us-cert.gov/cas/techalerts/TA08-253A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2008/2523
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-05
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://marc.info/?l=bugtraq&m=122235754013992&w=2
- http://www.insomniasec.com/advisories/ISVA-080910.1.htm
- http://www.securityfocus.com/archive/1/496178/100/0/threaded
- http://www.securityfocus.com/bid/31067
- http://www.securitytracker.com/id?1020833
- http://www.us-cert.gov/cas/techalerts/TA08-253A.htmlUS Government Resource
FAQ
What is CVE-2008-3007?
CVE-2008-3007 is a vulnerability with a CVSS score of 9.3 (HIGH). Argument injection vulnerability in a URI handler in Microsoft Office XP SP3, 2003 SP2 and SP3, 2007 Office System Gold and SP1, and Office OneNote 2007 Gold and SP1 allow remote attackers to execute ...
How severe is CVE-2008-3007?
CVE-2008-3007 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3007?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Office, Microsoft Office Onenote.