Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-0656 | First vendor Publication | 2011-04-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft PowerPoint 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate PersistDirectoryEntry records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Slide with a malformed record, which triggers an exception and later use of an unspecified method, aka "Persist Directory RCE Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0656 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11761 | |||
Oval ID: | oval:org.mitre.oval:def:11761 | ||
Title: | Persist Directory RCE Vulnerability | ||
Description: | Microsoft PowerPoint 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate PersistDirectoryEntry records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Slide with a malformed record, which triggers an exception and later use of an unspecified method, aka "Persist Directory RCE Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-0656 | Version: | 13 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Microsoft Office PowerPoint 2002 Microsoft Office PowerPoint 2003 Microsoft Office PowerPoint 2007 Microsoft Office PowerPoint 2010 Microsoft Office Compatibility Pack Microsoft PowerPoint Viewer 2007 Microsoft PowerPoint Viewer soft PowerPoint Web App |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 4 | |
Application | 1 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2012-03-06 | Name : Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability File : nvt/secpod_ms11-020_remote.nasl |
2011-04-13 | Name : Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283) File : nvt/secpod_ms11-022.nasl |
2011-02-23 | Name : Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability File : nvt/gb_ms_power_point_code_exec_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71770 | Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Exec... Multiple Microsoft products contain a flaw related to the handling of PersistDirectoryEntry record exceptions. The issue is triggered when the program uses a method derived from a malformed object created by this flaw. This may allow a context-dependent attacker to use a crafted document containing an invalid record to execute arbitrary code. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2011-04-14 | IAVM : 2011-A-0047 - Multiple Vulnerabilities in Microsoft Office PowerPoint Severity : Category II - VMSKEY : V0026525 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-12 | Microsoft Office PowerPoint OfficeArt atom memory corruption attempt RuleID : 50962 - Revision : 1 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37035 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37034 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37033 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37032 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37031 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37030 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 37029 - Revision : 2 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 21647 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 19811 - Revision : 13 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint OfficeArt atom memory corruption attempt RuleID : 18637 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint SlideAtom record exploit attempt RuleID : 18636 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint malformed record call to freed object attempt RuleID : 18635 - Revision : 17 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-12-13 | Name : Arbitrary code can be executed on the remote host through Microsoft PowerPoint. File : smb_nt_ms11-094.nasl - Type : ACT_GATHER_INFO |
2011-04-13 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_apr2011.nasl - Type : ACT_GATHER_INFO |
2011-04-13 | Name : Arbitrary code can be executed on the remote host through Microsoft PowerPoint. File : smb_nt_ms11-022.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:05:28 |
|
2024-11-28 12:24:47 |
|
2021-05-04 12:13:58 |
|
2021-04-22 01:15:08 |
|
2020-05-23 00:27:46 |
|
2018-10-13 00:23:03 |
|
2018-10-10 00:19:41 |
|
2017-09-19 09:24:13 |
|
2016-06-28 18:32:46 |
|
2016-04-26 20:32:26 |
|
2014-02-17 11:00:22 |
|
2014-01-19 21:27:35 |
|
2013-11-11 12:39:11 |
|
2013-05-10 22:54:23 |
|
2013-01-15 13:21:09 |
|