CVE-2010-3333

HIGH
2010-11-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:17 vuln.today
Added to CISA KEV
Oct 22, 2025 - 01:15 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 01:15 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 01:15 nvd
Patch available
CVE Published
Nov 10, 2010 - 03:00 nvd
HIGH 7.8

Description

Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."

Analysis

Microsoft Office XP through 2010 and Office for Mac contain a stack-based buffer overflow in RTF parsing that allows remote code execution via crafted RTF data, widely exploited in targeted attack campaigns.

Technical Context

The CWE-787 vulnerability occurs when Office parses RTF files containing malformed property data. The stack buffer overflow in the RTF parsing routine allows attackers to overwrite the return address and redirect execution to shellcode embedded in the document.

Affected Products

['Microsoft Office XP SP3', 'Microsoft Office 2003 SP3', 'Microsoft Office 2007 SP2', 'Microsoft Office 2010', 'Microsoft Office 2004/2008 for Mac', 'Microsoft Office for Mac 2011', 'Open XML File Format Converter for Mac']

Remediation

Apply Microsoft security update MS10-087. Use Office File Validation and Protected View features in newer Office versions. Block RTF files at email gateways where possible.

Priority Score

213
Low Medium High Critical
KEV: +50
EPSS: +93.8
CVSS: +39
POC: +20

Share

CVE-2010-3333 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy