MS02-021: Word Mail Reply Arbitrary Script Execution (321804)

high Nessus Plugin ID 11325

Synopsis

Arbitrary code can be executed on the remote host through Word.

Description

Outlook 2000 and 2002 provide the option to use Microsoft Word as the email editor when creating and editing email in RTF or HTML.

There is a flaw in some versions of Word that could allow an attacker to execute arbitrary code when the user replies to a specially formed message using Word.

An attacker could use this flaw to execute arbitrary code on this host.

Solution

Microsoft has released a set of patches for Office 2000 and 2002.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-021

Plugin Details

Severity: High

ID: 11325

File Name: smb_nt_ms02-021.nasl

Version: 1.47

Type: local

Agent: windows

Published: 3/6/2003

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:outlook

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 4/25/2002

Vulnerability Publication Date: 3/31/2002

Reference Information

CVE: CVE-2002-1056

BID: 4397

MSFT: MS02-021

MSKB: 321804