This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-06-12
Product Lync Last view 2015-12-09
Version 2010 Type Application
Update *  
Edition x64  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:lync

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2015-12-09 CVE-2015-6106

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2015-09-08 CVE-2015-2510

Buffer overflow in the Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Graphics Component Buffer Overflow Vulnerability."

9.3 2013-11-06 CVE-2013-3906

GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.

9.3 2013-07-09 CVE-2013-3129

Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."

9.3 2013-05-14 CVE-2013-1302

Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability."

4.3 2012-06-12 CVE-2012-1858

The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability."

9.3 2012-06-12 CVE-2012-1849

Untrusted search path vulnerability in Microsoft Lync 2010, 2010 Attendee, and 2010 Attendant allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .ocsmeet file, aka "Lync Insecure Library Loading Vulnerability."

CWE : Common Weakness Enumeration

%idName
50% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (2) CWE-94 Failure to Control Generation of Code ('Code Injection')
16% (1) CWE-200 Information Exposure

ExploitDB Exploits

id Description
30011 Microsoft Tagged Image File Format (TIFF) Integer Overflow
19777 IE9, SharePoint, Lync toStaticHTML HTML Sanitizing Bypass

OpenVAS Exploits

id Description
2012-07-11 Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502)
File : nvt/secpod_ms12-050.nasl
2012-06-13 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
File : nvt/secpod_ms12-037.nasl
2012-06-13 Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
File : nvt/secpod_ms12-039.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2013-A-0225 Microsoft GDI Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0042593
2013-A-0135 Microsoft GDI+ Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039199
2013-B-0071 Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity: Category II - VMSKEY: V0039211
2013-B-0051 Microsoft Lync Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0037938

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38011 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38010 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38009 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38008 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38007 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38006 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38005 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38004 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38003 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38002 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38001 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 IE MsRdpClient ActiveX attempt
RuleID : 38000 - Type : BROWSER-PLUGINS - Revision : 2
2016-04-05 IE MsRdpClient ActiveX attempt
RuleID : 37999 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 IE MsRdpClient ActiveX attempt
RuleID : 37998 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 IE MsRdpClient ActiveX attempt
RuleID : 37997 - Type : BROWSER-PLUGINS - Revision : 2
2016-04-05 IE MsRdpClient ActiveX attempt
RuleID : 37996 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 IE MsRdpClient ActiveX attempt
RuleID : 37995 - Type : BROWSER-PLUGINS - Revision : 1
2016-03-14 Microsoft Office Word OGL module out of bounds read attempt
RuleID : 36967 - Type : FILE-OFFICE - Revision : 2
2016-03-14 Microsoft Office Word OGL module out of bounds read attempt
RuleID : 36966 - Type : FILE-OFFICE - Revision : 2
2015-10-14 Microsoft Windows GDI+ denial of service attempt
RuleID : 35985 - Type : OS-WINDOWS - Revision : 2
2015-10-14 Microsoft Windows GDI+ denial of service attempt
RuleID : 35984 - Type : OS-WINDOWS - Revision : 2
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28526 - Type : FILE-OFFICE - Revision : 8
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28525 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft GDI library TIFF handling memory corruption attempt
RuleID : 28488 - Type : OS-WINDOWS - Revision : 3
2014-01-10 Microsoft GDI library TIFF handling memory corruption attempt
RuleID : 28487 - Type : OS-WINDOWS - Revision : 3

Nessus® Vulnerability Scanner

id Description
2015-12-08 Name: A multimedia application framework installed on the remote Mac OS X host is a...
File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO
2015-09-09 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-097.nasl - Type: ACT_GATHER_INFO
2013-12-11 Name: The remote Windows host has a remote code execution vulnerability.
File: smb_nt_ms13-096.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms13-052.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-053.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The remote Windows host has a remote code execution vulnerability.
File: smb_nt_ms13-054.nasl - Type: ACT_GATHER_INFO
2013-05-15 Name: The remote host is affected by a remote code execution vulnerability.
File: smb_nt_ms13-041.nasl - Type: ACT_GATHER_INFO
2012-07-11 Name: The remote host is affected by multiple privilege escalation and information ...
File: smb_nt_ms12-050.nasl - Type: ACT_GATHER_INFO
2012-06-13 Name: The remote host is affected by code execution vulnerabilities.
File: smb_nt_ms12-037.nasl - Type: ACT_GATHER_INFO
2012-06-13 Name: Arbitrary code can be executed on the remote host through Microsoft Lync.
File: smb_nt_ms12-039.nasl - Type: ACT_GATHER_INFO