Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution (3017301) |
Informations | |||
---|---|---|---|
Name | MS14-081 | First vendor Publication | 2014-12-09 |
Vendor | Microsoft | Last vendor Modification | 2014-12-09 |
Severity (Vendor) | Critical | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Severity Rating: Critical |
Original Source
Url : https://technet.microsoft.com/en-us/library/security/MS14-081 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28006 | |||
Oval ID: | oval:org.mitre.oval:def:28006 | ||
Title: | Use After Free Word Remote Code Execution Vulnerability - CVE-2014-6357 (MS14-081) | ||
Description: | Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-6357 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | Microsoft Word 2013 Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft Word Viewer Microsoft SharePoint Server 2013 Microsoft SharePoint Server 2010 Microsoft Office Compatibility Pack |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28299 | |||
Oval ID: | oval:org.mitre.oval:def:28299 | ||
Title: | Invalid index remote code execution vulnerability - CVE-2014-6356 (MS14-081) | ||
Description: | Array index error in Microsoft Word 2007 SP3, Word 2010 SP2, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Invalid Index Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-6356 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | Microsoft Office Compatibility Pack Microsoft Word 2007 Microsoft Word 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28433 | |||
Oval ID: | oval:org.mitre.oval:def:28433 | ||
Title: | Use after free word remote code execution vulnerability - CVE-2014-6357 (MS14-081) | ||
Description: | Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability." | ||
Family: | macos | Class: | vulnerability |
Reference(s): | CVE-2014-6357 | Version: | 3 |
Platform(s): | Apple Mac OS X Apple Mac OS X Server | Product(s): | Microsoft Office 2011 for Mac |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application |
| 7 |
Application | 1 | |
Application | 3 | |
Application | 3 | |
Application | 2 | |
Application | 1 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-12-11 | IAVM : 2014-A-0190 - Microsoft Word and Office Remote Code Execution Vulnerability (MS14-081) Severity : Category II - VMSKEY : V0057701 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-01-08 | Microsoft Office Word array index out-of-bounds attempt RuleID : 32712 - Revision : 2 - Type : FILE-OFFICE |
2015-01-08 | Microsoft Office Word array index out-of-bounds attempt RuleID : 32711 - Revision : 2 - Type : FILE-OFFICE |
2015-01-08 | Microsoft Office RTF object use after free attempt RuleID : 32708 - Revision : 2 - Type : FILE-OFFICE |
2015-01-08 | Microsoft Office RTF object use after free attempt RuleID : 32707 - Revision : 2 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-12-09 | Name : An application installed on the remote Mac OS X host is affected by a remote ... File : macosx_ms14-081.nasl - Type : ACT_GATHER_INFO |
2014-12-09 | Name : The remote host is affected by multiple remote code execution vulnerabilities. File : smb_nt_ms14-081.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-27 04:54:12 |
|
2015-10-18 17:26:25 |
|
2015-01-08 21:27:46 |
|
2014-12-12 00:26:36 |
|
2014-12-11 05:32:09 |
|
2014-12-10 13:27:03 |
|
2014-12-09 21:29:39 |
|
2014-12-09 21:16:38 |
|