CVE-2008-3471

N/A Unknown
Published: October 15, 2008 Modified: April 23, 2026
View on NVD

Description

Stack-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a BIFF file with a malformed record that triggers a user-influenced size calculation, aka "File Format Parsing Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2
Source: secure@microsoft.com
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/32211
Source: secure@microsoft.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/31705
Source: secure@microsoft.com
Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021044
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2808
Source: secure@microsoft.com
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-068/
Source: secure@microsoft.com
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45579
Source: secure@microsoft.com
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45581
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=122479227205998&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/32211
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/bid/31705
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021044
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2808
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-068/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45579
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45581
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5750
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
73.2%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft