{"vuid":"VU#355707","idnumber":"355707","name":"Microsoft Office Web Components allows reading of local files via \"LoadText\" method by using URL redirection","keywords":["Microsoft Office","Office Web Components","read local files","LoadText method","URL redirect"],"overview":"The Microsoft Office Web Components allow a remote attacker to read arbitrary files.","clean_desc":"The Microsoft Office Web Components (OWC) are ActiveX controls that can be embedded in web pages. These controls give users of a website limited Microsoft Office functionality, without having to have the entire Office suite installed on their machine. One of the controls allows a web page to load text into the window of a web browser. A flaw in this control allows a remote attacker to read arbitrary files on the vulnerable system. Note that in order to successfully exploit this vulnerability, the attacker would have to know the name and path to the file they wish to read. For more information, please see Microsoft Security Bulletin MS02-044.","impact":"An remote attacker can read arbitrary files on the vulnerable system.","resolution":"Apply a vendor supplied patch.","workarounds":"","sysaffected":"","thanks":"Thanks to GreyMagic Software for reporting this vulnerability.","author":"This document was written by Ian A Finlay.","public":["http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-044.asp","http://security.greymagic.com/adv/gm006-ie/","http://www.iss.net/security_center/static/8778.php","http://www.securityfocus.com/bid/4453"],"cveids":["CVE-2002-0860"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-09T15:43:05Z","publicdate":"2002-08-21T00:00:00Z","datefirstpublished":"2002-08-26T17:03:48Z","dateupdated":"2002-08-26T17:05:39Z","revision":26,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"11","cam_attackeraccessrequired":"19","cam_scorecurrent":"30.86015625","cam_scorecurrentwidelyknown":"30.86015625","cam_scorecurrentwidelyknownexploited":"39.67734375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.86015625,"vulnote":null}