2013-05-14 This security update resolves eleven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user open a specially crafted Publisher file with an affected version of Microsoft Publisher. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Vulnerabilities addressed in this bulletin:
Publisher Negative Value Allocation Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1316
Publisher Integer Overflow Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1317
Publisher Corrupt Interface Pointer Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1318
Publisher Return Value Handling Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1319
Publisher Buffer Overflow Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1320
Publisher Return Value Validation Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1321
Publisher Invalid Range Check Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1322
Publisher Incorrect NULL Value Handling Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1323
Publisher Signed Integer Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1327
Publisher Buffer Underflow Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1329
Publisher Pointer Handling Vulnerability
Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2013-1328

Bulletin details at Microsoft.com

Related CVE Entries

Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
Max CVSS
9.3
EPSS Score
62.39%
Published
2013-05-15
Updated
2018-10-12
Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher Integer Overflow Vulnerability."
Max CVSS
9.3
EPSS Score
74.56%
Published
2013-05-15
Updated
2018-10-12
Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers access to an invalid pointer, aka "Publisher Corrupt Interface Pointer Vulnerability."
Max CVSS
10.0
EPSS Score
94.25%
Published
2013-05-15
Updated
2018-10-12
Microsoft Publisher 2003 SP3 does not properly check the return value of an unspecified method, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Return Value Handling Vulnerability."
Max CVSS
10.0
EPSS Score
84.65%
Published
2013-05-15
Updated
2018-10-12
Buffer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Buffer Overflow Vulnerability."
Max CVSS
10.0
EPSS Score
87.31%
Published
2013-05-15
Updated
2018-10-12
Microsoft Publisher 2003 SP3 does not properly check the data type of an unspecified return value, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Return Value Validation Vulnerability."
Max CVSS
9.3
EPSS Score
67.43%
Published
2013-05-15
Updated
2018-10-12
Microsoft Publisher 2003 SP3 does not properly check table range data, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Invalid Range Check Vulnerability."
Max CVSS
10.0
EPSS Score
84.65%
Published
2013-05-15
Updated
2018-10-12
Microsoft Publisher 2003 SP3 does not properly handle NULL values for unspecified data items, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Incorrect NULL Value Handling Vulnerability."
Max CVSS
9.3
EPSS Score
91.14%
Published
2013-05-15
Updated
2018-10-12
Integer signedness error in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper memory allocation, aka "Publisher Signed Integer Vulnerability."
Max CVSS
9.3
EPSS Score
89.35%
Published
2013-05-15
Updated
2018-10-12
Microsoft Publisher 2003 SP3, 2007 SP3, and 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers incorrect pointer handling, aka "Publisher Pointer Handling Vulnerability."
Max CVSS
9.3
EPSS Score
78.05%
Published
2013-05-15
Updated
2018-10-12
Integer signedness error in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers a buffer underflow, aka "Publisher Buffer Underflow Vulnerability."
Max CVSS
9.3
EPSS Score
92.12%
Published
2013-05-15
Updated
2018-10-12
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!