CVE-2007-2223
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
14/08/2007
Last modified:
09/04/2025
Description
Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:* | ||
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:* | ||
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:* | ||
cpe:2.3:o:microsoft:windows_xp:-:*:*:*:professional:*:x64:* | ||
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:* | ||
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=576
- http://secunia.com/advisories/26447
- http://www.kb.cert.org/vuls/id/361968
- http://www.securityfocus.com/archive/1/476527/100/0/threaded
- http://www.securityfocus.com/archive/1/476747/100/0/threaded
- http://www.securityfocus.com/bid/25301
- http://www.securitytracker.com/id?1018559=
- http://www.vupen.com/english/advisories/2007/2866
- http://www.zerodayinitiative.com/advisories/ZDI-07-048/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-042
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2069
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=576
- http://secunia.com/advisories/26447
- http://www.kb.cert.org/vuls/id/361968
- http://www.securityfocus.com/archive/1/476527/100/0/threaded
- http://www.securityfocus.com/archive/1/476747/100/0/threaded
- http://www.securityfocus.com/bid/25301
- http://www.securitytracker.com/id?1018559=
- http://www.vupen.com/english/advisories/2007/2866
- http://www.zerodayinitiative.com/advisories/ZDI-07-048/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-042
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2069