This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Windows host could allow arbitrary code execution.
The remote host is running a version of Microsoft Works for Windows
document converter that is affected by a heap overflow vulnerability.
If an attacker can trick a user on the affected host into opening a
specially crafted Works file, this issue could be leveraged to run
arbitrary code on the host subject to the user's privileges.
See also :
Microsoft has released a set of patches for Microsoft Office 2007,
Microsoft Works 9, and Microsoft Works 6-9 File Converter.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 58660 ()
Bugtraq ID: 52867
CVE ID: CVE-2012-0177
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.