Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2012-06-12 |
Product | Lync | Last view | 2015-12-09 |
Version | 2010 | Type | Application |
Update | * | ||
Edition | x64 | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:lync |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2015-12-09 | CVE-2015-6106 | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
9.3 | 2015-09-08 | CVE-2015-2510 | Buffer overflow in the Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Graphics Component Buffer Overflow Vulnerability." |
9.3 | 2013-11-06 | CVE-2013-3906 | GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013. |
9.3 | 2013-07-09 | CVE-2013-3129 | Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability." |
9.3 | 2013-05-14 | CVE-2013-1302 | Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability." |
4.3 | 2012-06-12 | CVE-2012-1858 | The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability." |
9.3 | 2012-06-12 | CVE-2012-1849 | Untrusted search path vulnerability in Microsoft Lync 2010, 2010 Attendee, and 2010 Attendant allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .ocsmeet file, aka "Lync Insecure Library Loading Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (3) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
33% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
16% (1) | CWE-200 | Information Exposure |
ExploitDB Exploits
id | Description |
---|---|
30011 | Microsoft Tagged Image File Format (TIFF) Integer Overflow |
19777 | IE9, SharePoint, Lync toStaticHTML HTML Sanitizing Bypass |
OpenVAS Exploits
id | Description |
---|---|
2012-07-11 | Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502) File : nvt/secpod_ms12-050.nasl |
2012-06-13 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988) File : nvt/secpod_ms12-037.nasl |
2012-06-13 | Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956) File : nvt/secpod_ms12-039.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2013-A-0225 | Microsoft GDI Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0042593 |
2013-A-0135 | Microsoft GDI+ Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0039199 |
2013-B-0071 | Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight Severity: Category II - VMSKEY: V0039211 |
2013-B-0051 | Microsoft Lync Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0037938 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38011 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38010 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38009 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38008 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38007 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38006 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38005 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38004 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38003 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38002 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38001 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 38000 - Type : BROWSER-PLUGINS - Revision : 2 |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37999 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37998 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37997 - Type : BROWSER-PLUGINS - Revision : 2 |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37996 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37995 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-03-14 | Microsoft Office Word OGL module out of bounds read attempt RuleID : 36967 - Type : FILE-OFFICE - Revision : 2 |
2016-03-14 | Microsoft Office Word OGL module out of bounds read attempt RuleID : 36966 - Type : FILE-OFFICE - Revision : 2 |
2015-10-14 | Microsoft Windows GDI+ denial of service attempt RuleID : 35985 - Type : OS-WINDOWS - Revision : 2 |
2015-10-14 | Microsoft Windows GDI+ denial of service attempt RuleID : 35984 - Type : OS-WINDOWS - Revision : 2 |
2014-01-10 | Microsoft Office GDI library TIFF handling integer overflow attempt RuleID : 28526 - Type : FILE-OFFICE - Revision : 8 |
2014-01-10 | Microsoft Office GDI library TIFF handling integer overflow attempt RuleID : 28525 - Type : FILE-OFFICE - Revision : 9 |
2014-01-10 | Microsoft GDI library TIFF handling memory corruption attempt RuleID : 28488 - Type : OS-WINDOWS - Revision : 3 |
2014-01-10 | Microsoft GDI library TIFF handling memory corruption attempt RuleID : 28487 - Type : OS-WINDOWS - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2015-12-08 | Name: A multimedia application framework installed on the remote Mac OS X host is a... File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-09-09 | Name: The remote host is affected by multiple vulnerabilities. File: smb_nt_ms15-097.nasl - Type: ACT_GATHER_INFO |
2013-12-11 | Name: The remote Windows host has a remote code execution vulnerability. File: smb_nt_ms13-096.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The .NET Framework install on the remote Windows host could allow arbitrary c... File: smb_nt_ms13-052.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-053.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The remote Windows host has a remote code execution vulnerability. File: smb_nt_ms13-054.nasl - Type: ACT_GATHER_INFO |
2013-05-15 | Name: The remote host is affected by a remote code execution vulnerability. File: smb_nt_ms13-041.nasl - Type: ACT_GATHER_INFO |
2012-07-11 | Name: The remote host is affected by multiple privilege escalation and information ... File: smb_nt_ms12-050.nasl - Type: ACT_GATHER_INFO |
2012-06-13 | Name: The remote host is affected by code execution vulnerabilities. File: smb_nt_ms12-037.nasl - Type: ACT_GATHER_INFO |
2012-06-13 | Name: Arbitrary code can be executed on the remote host through Microsoft Lync. File: smb_nt_ms12-039.nasl - Type: ACT_GATHER_INFO |