Total vulnerabilities in the database
Microsoft PowerPoint 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate PersistDirectoryEntry records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Slide with a malformed record, which triggers an exception and later use of an unspecified method, aka "Persist Directory RCE Vulnerability."
Software | From | Fixed in |
---|---|---|
microsoft / open_xml_file_format_converter | - | - |
microsoft / office | 2008 | 2008.x |
microsoft / powerpoint | 2010 | 2010.x |
microsoft / office | 2004 | 2004.x |
microsoft / powerpoint | 2003-sp3 | 2003-sp3.x |
microsoft / powerpoint_web_app | - | - |
microsoft / office_compatibility_pack | 2007-sp2 | 2007-sp2.x |
microsoft / powerpoint | 2007-sp2 | 2007-sp2.x |
microsoft / powerpoint | 2002-sp3 | 2002-sp3.x |
microsoft / powerpoint_viewer | 2007-sp2 | 2007-sp2.x |
microsoft / office_powerpoint_viewer | - | - |
microsoft / office | 2011 | 2011.x |