9.3
CVSSv2

CVE-2010-3333

Published: 10/11/2010 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 952
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote malicious users to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office xp

microsoft open xml file format converter

microsoft office 2008

microsoft office 2011

microsoft office 2010

microsoft office 2004

microsoft office 2003

microsoft office 2007

Exploits

#!/usr/bin/python # Exploit Title: MS Office 2010 Download Execute # Google Dork: NA # Date: 19 Feb 2013 # Exploit Author: g11tch # Vendor Homepage: # Software Link: # Version: ALL # Tested on: [Windows XP SP1, SP2, Windows 7 ] # CVE : ########## #Just generate a meterpreter exe, then provide the link to it via the exploit, it will automagically ...
# Exploit Title: MS Office 2010 RTF Header Stack Overflow Vulnerability Exploit # Date: 7/3/2011 # Author: Snake ( Shahriyarj < at > gmail ) # Version: MS Office <= 2010 # Tested on: MS Office 2010 ( 14047341000) - Windows 7 # CVE : CVE-2010-3333 # This is the exploit I wrote for Abysssec "The Arashi" article # It gracefully bypass D ...
#!/usr/bin/python # # Note from the Exploit-DB team: This might be the same bug as: # githubcom/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/ms10_087_rtf_pfragments_bofrb # #-----------------------------------------------------------------------------------# # Exploit: Microsoft Office 2003 Home/Pro 0day - ...
## # $Id: ms10_087_rtf_pfragments_bofrb 11875 2011-03-04 08:39:48Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/ ...

Github Repositories

amliaW4's Blog

About 2014-hack-lu-oreo time:2018-6 categories:CTF \ Fastbin-Double-Free \ House-Of-Spirit 2014-hitcon-stkof 2016-bctf-bcloud 2016-hctf-fheap 2017-0ctf-babyheap 2018王鼎杯uess-ssp-leak ali-activex-imageMan chunk-extend chunk_notes CVE-2010-2553 CVE-2010-2883 CVE-2010-3333 CVE-2012-0158 defcamp-ctf-quals-2018-lucky-writeup dep double-free english-reading fastbin-attack h

Stix A Web API for storing Stix II vulnerabilities Requirements NET 7 MongoDB Running MongoDB The easiest way to get started is to run MongoDB in a docker container: docker pull mongo:latest docker run -d -p 27017:27017 --name=Stix mongo:latest The connection parameters can be configured in the appsettingsDevelopmentjson file Running

CVE-monitor This is a neat Github action that keeps you informed about updates to chosen CVEs Use it for monitoring unfixed CVEs or ones that you want to stay informed about The action takes a list of CVEs and a date of the last review from a text file (see details below), and finds which of these CVEs have had modifications after the last review was done Then, it can be cha

信息安全工程实践_漏洞利用开发与检测对抗

PracticeOfInformationSecurity 信息安全工程实践——漏洞利用开发与检测对抗,三人小组的两周成果 红方利用CVE-2010-3333漏洞进行远程木马植入windows XP系统,实现反弹回联、文件上传下载功能、实现远程桌面和鼠标操作功能,实现进程隐藏、文件隐藏、窗口隐藏功能 蓝方为受害机的

CVE-monitor This is a neat Github action that keeps you informed about updates to chosen CVEs Use it for monitoring unfixed CVEs or ones that you want to stay informed about The action takes a list of CVEs and a date of the last review from a text file (see details below), and finds which of these CVEs have had modifications after the last review was done Then, it can be cha

Aplicação de linha de comando para a disciplina CyberSecurity - Challenge DSRPT21 - 4ECR - FIAP 2020

Busca de CVEs Esta é uma aplicação de linha de comando escrita em Go, cujo objetivo é buscar informações sobre CVEs disponíveis na API pública CVE Search Utilização Para utilizar a API é necessário ter o Go instalado no sistema operacional de sua preferência Após a instalaç&a

A Unique Api With Special Stuff

Announcements 🕛 19th August, 2021 📢 Update Hey if you want to help the ZeroRaid you can do here we are currently make an plugin system for add your plugin to our bot ZeroRaid Unique Api | Full of AI Tutorial | How to Get a Apikey Join our discord and open a ticket and we explain how to do by yourself discordgg/7MEZZHD6Wh Next create a ticket and write api

威胁情报,恶意样本分析,开源Malware代码收集

Threat-Intelligence-Analyst 威胁情报,恶意样本分析,自动化python脚本,开源Malware代码收集,APT攻击安例相关 TI威胁情报 startme/p/rxRbpo/ti Analyzing Malicious Password Protected Office Documents r3mrumwordpresscom/2017/06/29/analyzing-malicious-password-protected-office-documents/ Hack githubcom/Hack-with-Github/Awesom

Recent Articles

Wicked WikiLeaks leaks considered harmful: Alert over malware lurking in dumped docs
The Register • Chris Williams, Editor in Chief • 17 Jul 2015

Tip-toe through the old-days, hope you don't hit a zero-day

Documents laced with malware have been found in WikiLeaks.org's cache of files obtained from hacked CIA wannabe Stratfor. Intelligence biz Stratfor was ransacked by Jeremy Hammond in late 2011, and its email archives passed to whistleblowing website WikiLeaks in early 2012. The Julian Assange™-led organization soon began distributing the archives using the BitTorrent file-sharing network, and publishing extracts on its website. In March 2015, WikiLeaks made the emails available in a handy sear...

Kaspersky Security Bulletin 2013. Corporate threats
Securelist • Vitaly Kamluk Sergey Lozhkin • 05 Dec 2013

Tat’jana Šerbakova PDF Version The number of serious cyber-attacks detected over the last two years has increased so much that new attacks rarely cause much surprise. It’s now commonplace for antivirus companies to issue a report about the discovery of another botnet or highly sophisticated malware campaign that is gathering data. Companies are increasingly falling victim to cyber-attacks. According to a survey conducted by Kaspersky Lab and B2B International, 91% of the organizations polle...

The Icefog APT: Frequently Asked Questions
Securelist • GReAT • 26 Sep 2013

Here are answers to the most frequently asked questions related to Icefog, an APT operation targeting entities in Japan and South Korea. Icefog refers to a cyber-espionage campaign that has been active at least since 2011. It targets governmental institutions, military contractors, maritime and ship-building groups, telecom operators, satellite operators, industrial and high technology companies and mass media, mainly in South Korea and Japan. It is likely that the crew targets organizations in ...

IT Threat Evolution: Q2 2013
Securelist • Christian Funk Denis Maslennikov • 15 Aug 2013

In early June, Kaspersky Lab announced a discovery that opened a whole new chapter in the field of cyber-espionage. Named NetTraveler, this is family of malicious programs used by APT actors to successfully compromise more than 350 high-profile victims in 40 countries. The NetTraveler group infected victims across both the public and private sector including government institutions, embassies, the oil and gas industry, research centers, military contractors and activists. The threat, which has b...

Space boffins, oil giants, nuke plants 'raided' by mystery code nasty
The Register • John Leyden • 05 Jun 2013

Spain, Kyrgyzstan, Mongolia, China, this malware has had quite a trip, we're told

A piece of government-bothering malware called NetTraveler has been active since 2004 - and targets agencies and organisations involved in space exploration, nanotechnology, nuclear power, lasers, medicine, communications and more. And that's according to researchers at security biz Kaspersky Lab. More than 350 high-profile outfits in 40 countries have been hit by strains of NetTraveler, we're told. Embassies, oil and gas corporations, research institutes, military contractors and activists have...

Spyware. HackingTeam
Securelist • Sergey Golovanov • 23 Apr 2013

This article is based on technical data from Kaspersky Lab experts and their analysis of the Korablin and Morcut malicious programs. A number of conclusions have been drawn by Kaspersky Lab experts based on open source data references in the conclusion of this publication. Any questions regarding the contents of this article can be posted on Kaspersky Lab’s securelist.com website, or you can contact Kaspersky Lab’s PR Service directly via Kaspersky.com. According to Wikipedia, “Spyware is...

Android Trojan Found in Targeted Attack
Securelist • Kurt Baumgartner Costin Raiu Denis Maslennikov • 26 Mar 2013

In the past, we’ve seen targeted attacks against Tibetan and Uyghur activists on Windows and Mac OS X platforms. We’ve documented several interesting attacks (A Gift for Dalai Lamas Birthday and Cyber Attacks Against Uyghur Mac OS X Users Intensify) which used ZIP files as well as DOC, XLS and PDF documents rigged with exploits. Several days ago, the e-mail account of a high-profile Tibetan activist was hacked and used to send targeted attacks to other activists and human rights advocates. P...

New Uyghur and Tibetan Themed Attacks Using PDF Exploits
Securelist • Igor Soumenkov Costin Raiu • 14 Mar 2013

On Feb 12th 2013, FireEye announced the discovery of an Adobe Reader 0-day exploit which is used to drop a previously unknown, advanced piece of malware. We called this new malware “ItaDuke” because it reminded us of Duqu and because of the ancient Italian comments in the shellcode copied from Dante Alighieri’s “Divine Comedy”. Previously, we posted about another campaign hitting Governments and other institutions, named Miniduke, which was also using the same “Divine Comedy” PDF e...

Adobe Flash Player 0-day and HackingTeam’s Remote Control System
Securelist • Sergey Golovanov • 12 Feb 2013

Last week, Adobe released a patch for a vulnerability in Flash Player that was being exploited in targeted attacks. Before reading any further, we recommend you to take a moment make sure you apply this patch. Adobe offers this nifty tool to check that you have the latest version of Flash Player. If you are running Google Chrome, make sure you have version -24.0.1312.57 m- or later. Now back to CVE-2013-0633, the critical vulnerability that was discovered and reported to Adobe by Kaspersky Lab r...

“Red October”. Detailed Malware Description 1. First Stage of Attack
Securelist • GReAT • 17 Jan 2013

Based on the analysis of known cases, we identified two main ways through which Backdoor.Win32.Sputnik infects the victims. Both methods rely on spear-phishing e-mails which are sent to the prospective victims. The e-mails contain an attachment which is either an Excel or Word document, with enticing names. In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also inf...

Red October – Java Exploit Delivery Vector Analysis
Securelist • GReAT • 16 Jan 2013

Since the publication of our report, our colleagues from Seculert have discovered and posted a blog about the usage of another delivery vector in the Red October attacks. In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also infiltrated victim network(s) via Java exploitation (MD5: 35f1572eb7759cb7a66ca459c093e8a1 – ‘NewsFinder.jar’), known as the ‘Rhino’ exploit (CVE-2011-3544). We know the early February 2012 timeframe that ...

“Red October” Diplomatic Cyber Attacks Investigation
Securelist • GReAT • 14 Jan 2013

In October 2012, Kaspersky Lab’s Global Research & Analysis Team initiated a new threat research after a series of attacks against computer networks of various international diplomatic service agencies. A large scale cyber-espionage network was revealed and analyzed during the investigation, which we called “Red October” (after famous novel “The Hunt For The Red October”). This report is based on detailed technical analysis of a series of targeted attacks against diplomatic, govern...