Microsoft Office执行跳转内存破坏漏洞(MS08-013)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

BUGTRAQ ID: 27738 CVE(CAN) ID: CVE-2008-0103 Microsoft Office是非常流行的办公软件套件。 Microsoft Office在处理注入了畸形对象的Office文件时存在内存破坏漏洞,如果用户受骗打开了特制的Office文件的话,就可能触发这个漏洞,导致执行任意指令。 Microsoft Office XP SP3 Microsoft Office 2004 for Mac Microsoft Office 2003 Service Pack 2 Microsoft Office 2000 Service Pack 3 临时解决方法: * 限制对VBE6.dll的访问,在命令行键入: Windows XP: Echo y|cacls &quot;%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll&quot; /E /P everyone:N Windows Vista: Takeown.exe /f &quot;%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll&quot; Icacls.exe &quot;%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll&quot; /save %TEMP%\VBE6_ACL.TXT Icacls.exe &quot;%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll&quot; /deny everyone:(F) 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-013)以及相应补丁: MS08-013:Vulnerability in Microsoft Office Could Allow Remote Code Execution (947108) 链接:<a...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息