Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-4117 | First vendor Publication | 2014-10-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4117 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:27041 | |||
Oval ID: | oval:org.mitre.oval:def:27041 | ||
Title: | Microsoft word file format vulnerability - CVE-2014-4117 (MS14-061) | ||
Description: | Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-4117 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Office 2007 Microsoft Word 2007 Microsoft Word 2010 Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft SharePoint Server 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27110 | |||
Oval ID: | oval:org.mitre.oval:def:27110 | ||
Title: | Microsoft word file format vulnerability - CVE-2014-4117 (MS14-061) (Mac OS X) | ||
Description: | Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability." | ||
Family: | macos | Class: | vulnerability |
Reference(s): | CVE-2014-4117 | Version: | 3 |
Platform(s): | Apple Mac OS X Apple Mac OS X Server | Product(s): | Microsoft Office 2011 for Mac |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Application | 1 | |
Application | 2 | |
Application | 2 | |
Application | 3 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-03-26 | Microsoft Office Word styleWithEffects use-after-free attempt RuleID : 49254 - Revision : 4 - Type : FILE-OFFICE |
2019-03-26 | Microsoft Office Word styleWithEffects use-after-free attempt RuleID : 49253 - Revision : 4 - Type : FILE-OFFICE |
2015-08-04 | Microsoft Office Word nested tblStylePr element use after free attempt RuleID : 35021 - Revision : 3 - Type : FILE-OFFICE |
2015-08-04 | Microsoft Office Word nested tblStylePr element use after free attempt RuleID : 35020 - Revision : 4 - Type : FILE-OFFICE |
2015-08-04 | Microsoft Office Word nested tblStylePr element use after free attempt RuleID : 35019 - Revision : 3 - Type : FILE-OFFICE |
2015-08-04 | Microsoft Office Word nested tblStylePr element use after free attempt RuleID : 35018 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word styleWithEffects use-after-free attempt RuleID : 32148 - Revision : 4 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Word styleWithEffects use-after-free attempt RuleID : 32147 - Revision : 4 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-10-15 | Name : An application installed on the remote Mac OS X host is affected by a remote ... File : macosx_ms14-061.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote host is affected by a remote code execution vulnerability. File : smb_nt_ms14-061.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:41:18 |
|
2021-05-04 12:32:39 |
|
2021-04-22 01:39:46 |
|
2020-05-23 00:41:20 |
|
2018-10-13 05:18:48 |
|
2015-10-30 21:23:39 |
|
2015-08-04 21:26:00 |
|
2015-07-28 21:24:09 |
|
2014-11-16 21:25:11 |
|
2014-10-31 13:24:43 |
|
2014-10-16 21:23:46 |
|
2014-10-16 13:25:27 |
|
2014-10-15 17:22:51 |
|