MS10-056: Vulnerability in Microsoft Office Word Could Allow Remote Code Execution (2269638)

High Nessus Plugin ID 48293


Arbitrary code can be executed on the remote host through Microsoft Word.


The remote Windows host is running a version of Microsoft Word or Word Viewer that is affected by several vulnerabilities. If an attacker can trick a user on the affected host into opening a specially crafted Word file, he could leverage this issue to execute arbitrary code subject to the user's privileges.


Microsoft has released a set of patches for Office XP, Word 2003, and Word Viewer.

See Also

Plugin Details

Severity: High

ID: 48293

File Name: smb_nt_ms10-056.nasl

Version: 1.30

Type: local

Agent: windows

Published: 2010/08/11

Updated: 2018/11/15

Dependencies: 11336, 27524, 57033

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:works, cpe:/a:microsoft:word, cpe:/a:microsoft:word_viewer, cpe:/a:microsoft:office_compatibility_pack

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/08/10

Vulnerability Publication Date: 2010/08/10

Reference Information

CVE: CVE-2010-1900, CVE-2010-1901, CVE-2010-1902, CVE-2010-1903

BID: 42130, 42132, 42133, 42136

MSFT: MS10-056

MSKB: 2251389, 2251399, 2251419, 2251437, 2277947