Microsoft Publisher File Conversion Textbox Remote Buffer Overflow Vulnerability

BID:39347

Info

Microsoft Publisher File Conversion Textbox Remote Buffer Overflow Vulnerability

Bugtraq ID: 39347
Class: Unknown
CVE: CVE-2010-0479
Remote: Yes
Local: No
Published: Apr 13 2010 12:00AM
Updated: Apr 22 2010 03:43PM
Credit: Lionel d'Hauenen working with TippingPoint�??s Zero Day Initiative
Vulnerable: Microsoft Publisher 2007 SP2
Microsoft Publisher 2007 SP1
Microsoft Publisher 2007 0
Microsoft Publisher 2003 SP3
Microsoft Publisher 2003 SP2
Microsoft Publisher 2003
Microsoft Publisher 2002 SP3
Microsoft Publisher 2002
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Home
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Professional
Not Vulnerable:

Discussion

Microsoft Publisher File Conversion Textbox Remote Buffer Overflow Vulnerability

Microsoft Publisher is prone to a remote buffer-overflow vulnerability.

An attacker can exploit this issue by enticing a victim to open a malicious Publisher file.

Successfully exploiting this issue would allow an attacker to execute arbitrary code in the context of the currently logged-in user.

Exploit / POC

Microsoft Publisher File Conversion Textbox Remote Buffer Overflow Vulnerability

A working commercial exploit is available through VUPEN Security - Exploit and PoCs Service. This exploit is not otherwise publicly available or known to be circulating in the wild.

Solution / Fix

Microsoft Publisher File Conversion Textbox Remote Buffer Overflow Vulnerability

Solution:
The vendor has released an advisory and updates. Please see the references for details.


Microsoft Publisher 2003 SP3

Microsoft Publisher 2007 SP1

Microsoft Publisher 2002 SP3

Microsoft Publisher 2007 SP2

References

Microsoft Publisher File Conversion Textbox Remote Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report