Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-4841

EPSS 74.55% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2008-4841

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008. NOTE: As of 20081210, it is unclear whether this vulnerability is related to a WordPad issue disclosed on 20080925 with a 2008-crash.doc.rar example, but there are insufficient details to be sure.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft写字板文件转换器远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
写字板是Windows操作系统中附件所提供的简单文本编辑工具。 对于没有安装Word的用户,可以使用写字板的文本转换器来打开.doc格式文档。如果用户使用转换器打开了特制的.doc、.wri或.rtf格式文档的话,就可能触发内存破坏,导致执行任意代码。目前这个漏洞正在被积极的利用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2008-4841

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2008-4841

登录查看更多情报信息。

Same Patch Batch · n/a · 2008-12-10 · 41 CVEs total

CVE-2008-5419EMC ControlCenter SAN Manager SST_CTGTRANS远程栈溢出漏洞
CVE-2008-4264Microsoft Excel畸形公式解析远程代码执行漏洞
CVE-2008-4265Microsoft Excel畸形对象解析远程代码执行漏洞
CVE-2008-4266Microsoft Excel数组内存破坏漏洞
CVE-2008-4268Microsoft Windows保存搜索文件处理内存破坏漏洞
CVE-2008-4269Microsoft Windows search-ms协议解析远程代码执行漏洞
CVE-2008-4837Microsoft Word畸形对象解析多个缓冲区溢出和内存破坏漏洞
CVE-2008-5416Microsoft SQL Server sp_replwritetovarbin远程堆溢出漏洞
CVE-2008-5417HP DECnet-Plus OpenVMS 'OSIT$NAMES'权限许可和访问控制漏洞
CVE-2008-5418PUNBB PunPortal login.php目录遍历漏洞
CVE-2008-4261Microsoft IE HTML渲染内存破坏漏洞
CVE-2008-5420EMC ControlCenter SAN Manager SST_SENDFILE远程文件检索漏洞
CVE-2008-4311D-Bus 规则绕过安全限制漏洞
CVE-2008-5304TWiki URLPARAM变量跨站脚本漏洞
CVE-2008-5305TWiki SEARCH变量SHELL命令注入漏洞
CVE-2008-5410Sun Solaris OpenSSL 'PKCS#11' Engine 远程拒绝服务漏洞
CVE-2008-5411IBM WebSphere应用程序服务器网络敏感信息泄露漏洞
CVE-2008-5412IBM WebSphere Windows上的JSPs未明漏洞
CVE-2008-5413IBM WebSphere PerfServlet信息泄露漏洞
CVE-2008-5414IBM WebSphere Feature Pack未明漏洞

Showing top 20 of 41 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2008-4841

No comments yet


Leave a comment