header-logo
Suggest Exploit
vendor:
Internet Explorer, Outlook and Word
by:
SecurityFocus
7.5
CVSS
HIGH
Misuse of VBScript ActiveX Word objects
20
CWE
Product Name: Internet Explorer, Outlook and Word
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Microsoft Internet Explorer, Outlook and Word Denial of Service Vulnerability

It is possible to misuse VBScript ActiveX Word objects to cause a denial of service to affected software. This is accomplished by creating an excessive number of Word objects. Even if the user chooses not to proceed, the ActiveX Word object is still loaded into memory an excessive number of times, resulting in a denial of service to the whole system.

Mitigation:

Disable VBScript ActiveX Word objects in the affected software.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4463/info

A vulnerability has been discovered which is reported to affect Microsoft Internet Explorer, Outlook and Word. Other Office components may also be affected by this issue.

It is possible to misuse VBScript ActiveX Word objects to cause a denial of service to affected software. This is accomplished by creating an excessive number of Word objects.

It should be noted that this misuse of VBScript ActiveX Word objects will cause a security warning to be displayed about the creation of an unsafe ActiveX object (depending on the security settings of the affected program). However, even if the user chooses not to proceed, the ActiveX Word object is still loaded into memory an excessive number of times. A denial of service to the whole system may be the result.

<SCRIPT LANGUAGE="VbScript">
On Error Resume Next
Dim a
Dim i
for i=1 to 100
Set a = CreateObject("Word.Application")
Next
</SCRIPT>