Summary
This host is installed with Microsoft Word and is prone to information disclosure vulnerability
Impact
Successful exploitation could allow remote attackers to retrieve sensitive information about sender's account name and a Temporary Internet Files subdirectory name.
Impact Level: System
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
For updates refer to http://office.microsoft.com/en-us/word/default.aspx
Insight
In MS Word when the Save as PDF add-on is enabled, places an absolute pathname in the Subject field during an Email as PDF operation.
Affected
Microsoft Office Word 2007 on Windows.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-6063 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apple Safari libxml Denial of Service Vulnerability
- Adobe Products Unspecified Cross-Site Scripting Vulnerability June-2011 (Windows)
- Apple Mac OS X Denial of Service Vulnerability
- Asterisk CIDR Notation in Access Rule Remote Security Bypass Vulnerability
- Apple Safari Webcore Webkit 'XSSAuditor.cpp' XSS Vulnerability (Mac OS X)