Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2016-3282 | First vendor Publication | 2016-07-12 |
Vendor | Cve | Last vendor Modification | 2018-10-12 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.8 | ||
Base Score | 7.8 | Environmental Score | 7.8 |
impact SubScore | 5.9 | Temporal Score | 7.8 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, SharePoint Server 2016, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3282 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 3 | |
Application | 4 | |
Application | 2 | |
Application | 1 | |
Application | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2018-07-31 | Microsoft Office Excel empty bookViews element denial of service attempt RuleID : 47056 - Revision : 2 - Type : FILE-OFFICE |
2018-07-31 | Microsoft Office Excel empty bookViews element denial of service attempt RuleID : 47055 - Revision : 1 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Excel empty bookViews element denial of service attempt RuleID : 39525 - Revision : 3 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Excel empty bookViews element denial of service attempt RuleID : 39524 - Revision : 3 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Word unsupported XML schema out of bounds read attempt RuleID : 39523 - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Word unsupported XML schema out of bounds read attempt RuleID : 39522 - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Word unsupported XML schema out of bounds read attempt RuleID : 39521 - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Word unsupported XML schema out of bounds read attempt RuleID : 39520 - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Word wwlib out of bounds memory access attempt RuleID : 39519 - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office Word wwlib out of bounds memory access attempt RuleID : 39518 - Revision : 2 - Type : FILE-OFFICE |
2016-08-09 | Microsoft Office Word wwlib out-of-bounds memory access attempt RuleID : 39504 - Revision : 2 - Type : FILE-OFFICE |
2016-08-09 | Microsoft Office Word wwlib out-of-bounds memory access attempt RuleID : 39503 - Revision : 2 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word Document remote code execution attempt RuleID : 25631 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel with embedded Flash file attachment RuleID : 18548 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel with embedded Flash file transfer RuleID : 18545 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word Document remote code execution attempt RuleID : 16234 - Revision : 14 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-07-12 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms16-088_office.nasl - Type : ACT_GATHER_INFO |
2016-07-12 | Name : An application installed on the remote Windows host is affected by multiple v... File : smb_nt_ms16-088.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:48:46 |
|
2021-04-22 01:59:41 |
|
2020-05-23 00:50:39 |
|
2018-10-13 05:19:02 |
|
2017-09-01 09:24:46 |
|
2016-11-29 00:26:07 |
|
2016-07-15 01:00:26 |
|
2016-07-13 13:25:48 |
|
2016-07-13 09:24:03 |
|