Microsoft Office Publisher

Risk: High
Local: Yes
Remote: No
CWE: CWE-noinfo

CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

I found two ways to cause a denial of service on the Microsoft Office Publisher, this is done by creating a malformed file with the following characteristics: The first is to create a new file and modifying hexadicimal with an editor from the direction 00006B90 to 00006D90 with the letter "A", that causes the publisher fails, when you open with a debugger like ollydbg I strip the following exception Access violation when reading [00000046] Here I leave the proof of concept Http:// The following causes the crash programme. We make a new file and adds an option to "wordart" inserting many letters "A", we open with a hex editor and change from the direction 000077D0 to 000079B0 with the letter "A". I leave the proof of concept: Http:// Juan Pablo Lopez Yacubian

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top