MS02-021: Word Mail Reply Arbitrary Script Execution (321804)

High Nessus Plugin ID 11325


Arbitrary code can be executed on the remote host through Word.


Outlook 2000 and 2002 provide the option to use Microsoft Word as the email editor when creating and editing email in RTF or HTML.

There is a flaw in some versions of Word that could allow an attacker to execute arbitrary code when the user replies to a specially formed message using Word.

An attacker could use this flaw to execute arbitrary code on this host.


Microsoft has released a set of patches for Office 2000 and 2002.

See Also

Plugin Details

Severity: High

ID: 11325

File Name: smb_nt_ms02-021.nasl

Version: $Revision: 1.45 $

Type: local

Agent: windows

Published: 2003/03/06

Modified: 2017/05/26

Dependencies: 11336, 57033

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 8.1

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:outlook

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2002/04/25

Vulnerability Publication Date: 2002/03/31

Reference Information

CVE: CVE-2002-1056

BID: 4397

OSVDB: 2061

MSFT: MS02-021

MSKB: 321804