Vulnerability Note VU#416001

Microsoft Office XP contains buffer overflow vulnerability

Original Release date: 08 Feb 2005 | Last revised: 09 Feb 2005


A buffer overflow in Microsoft Office XP may allow a remote attacker to execute arbitrary code on a vulnerable system.


Microsoft Office XP is vulnerable to a buffer overflow. According to MS05-005, the buffer overflow exists in the process that passes URL file locations to Microsoft Office XP software. Please note that customers using Microsoft ISA 2004 as their web proxy are at less risk because ISA 2004 rejects the URL in question by default when handling proxy client requests.

For more information about this issue including the versions of Office affected and remediation techniques, please see MS05-005.


If a remote attacker can persuade a user to access a specially crafted HTML file or hyperlink using a vulnerable Office application, that attacker may be able to execute arbitrary code.


Apply Patch

Microsoft has released Microsoft Security Bulletin MS05-005 to address this issue.

Do Not Access Unsolicited HTML Files or Click Unsolicited Hyperlinks

By only accessing HTML file or clicking hyperlinks form known or trusted sources, the chances of exploitation are reduced.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-08 Feb 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported in Microsoft Security Bulletin MS05-005. Microsoft credits Rafel Ivgi for providing information regarding this vulnerability.

This document was written by Jeff Gennari based on information from Microsoft Security Bulletin MS05-005.

Other Information

  • CVE IDs: CAN-2004-0848
  • Date Public: 08 Feb 2005
  • Date First Published: 08 Feb 2005
  • Date Last Updated: 09 Feb 2005
  • Severity Metric: 14.63
  • Document Revision: 28


If you have feedback, comments, or additional information about this vulnerability, please send us email.