Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-0085 | First vendor Publication | 2015-03-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0085 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28631 | |||
Oval ID: | oval:org.mitre.oval:def:28631 | ||
Title: | Microsoft office component use after free vulnerability - CVE-2015-0085 (MS15-022) | ||
Description: | Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2015-0085 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel Viewer 2007 Microsoft Office 2007 Microsoft Office 2010 Microsoft Office 2013 Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft PowerPoint 2007 Microsoft PowerPoint 2010 Microsoft SharePoint Foundation 2010 Microsoft SharePoint Foundation 2013 Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 Microsoft SharePoint Services 3.0 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word 2013 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 | |
Application | 5 | |
Application | 1 | |
Application | 3 | |
Application | 2 | |
Application | 3 | |
Application | 4 | |
Application | 1 | |
Application | 1 | |
Application | 5 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-03-12 | IAVM : 2015-A-0052 - Multiple Vulnerabilities in Microsoft Office (MS15-022) Severity : Category II - VMSKEY : V0058999 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-04-04 | Microsoft Office RTF out-of-bounds memory access attempt RuleID : 41792 - Revision : 3 - Type : FILE-OTHER |
2017-04-04 | Microsoft Office RTF out-of-bounds memory access attempt RuleID : 41791 - Revision : 3 - Type : FILE-OTHER |
2016-12-08 | Microsoft Office RTF out-of-bounds memory access attempt RuleID : 40728 - Revision : 2 - Type : FILE-OTHER |
2016-12-08 | Microsoft Office RTF out-of-bounds memory access attempt RuleID : 40727 - Revision : 2 - Type : FILE-OTHER |
2015-04-14 | Microsoft Sharepoint user display name XSS attempt RuleID : 33809 - Revision : 3 - Type : SERVER-OTHER |
2015-04-14 | Microsoft Sharepoint Server Newsfeed XSS attempt RuleID : 33808 - Revision : 3 - Type : SERVER-OTHER |
2015-04-10 | Microsoft Office ADODB.RecordSet code execution attempt RuleID : 33735 - Revision : 2 - Type : FILE-OFFICE |
2015-04-10 | Microsoft Office ADODB.RecordSet code execution attempt RuleID : 33734 - Revision : 2 - Type : FILE-OFFICE |
2015-04-10 | Microsoft Office Word incorrect schema property remote code execution attempt RuleID : 33716 - Revision : 3 - Type : FILE-OFFICE |
2015-04-10 | Microsoft Office Word incorrect schema property remote code execution attempt RuleID : 33715 - Revision : 3 - Type : FILE-OFFICE |
2015-04-07 | Microsoft Office RTF out-of-bounds memory access attempt RuleID : 33706 - Revision : 3 - Type : FILE-OTHER |
2015-04-07 | Microsoft Office RTF out-of-bounds memory access attempt RuleID : 33705 - Revision : 2 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-11 | Name : The remote host is affected by multiple remote code execution vulnerabilities. File : smb_nt_ms15-022.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:44:28 |
|
2021-05-04 12:36:01 |
|
2021-04-22 01:43:44 |
|
2020-05-23 00:43:20 |
|
2018-10-13 05:18:51 |
|
2015-10-28 09:23:00 |
|
2015-10-18 17:23:08 |
|
2015-04-10 21:25:47 |
|
2015-03-18 09:28:29 |
|
2015-03-12 13:24:15 |
|
2015-03-12 00:22:38 |
|
2015-03-11 17:23:06 |
|