|
Description: | | Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%%00" (null byte) in .doc filenames or (2) "%%0a" (carriage return) in .rtf filenames. |
|
Impact: | | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service. |
|
Affected OS: | | Solaris, FreeBSD, Windows, Linux, Other Unix, Others |
|
Reference: | | MicrosoftSecurityBulletin:ms05-005
|
|