Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-1649 | First vendor Publication | 2015-04-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1649 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28690 | |||
Oval ID: | oval:org.mitre.oval:def:28690 | ||
Title: | Microsoft office component use after free vulnerability - CVE-2015-1649 (MS15-033) | ||
Description: | Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2015-1649 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 | Product(s): | Microsoft Word 2007 Microsoft Word 2010 Microsoft SharePoint Server 2010 Microsoft Office Web Apps 2010 Microsoft Office Compatibility Pack Microsoft Word Viewer |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 | |
Application | 1 | |
Application | 2 | |
Application | 2 | |
Application | 3 | |
Application | 1 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-04-16 | IAVM : 2015-A-0090 - Multiple Vulnerabilities in Microsoft Office (MS15-033) Severity : Category II - VMSKEY : V0059895 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49049 - Revision : 1 - Type : FILE-OFFICE |
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49048 - Revision : 1 - Type : FILE-OFFICE |
2017-10-17 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 44364 - Revision : 2 - Type : FILE-OFFICE |
2017-10-17 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 44363 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader CLSID ASLR bypass download attempt RuleID : 40635 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly CLSID ASLR bypass download attempt RuleID : 40634 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader CLSID ASLR bypass download attempt RuleID : 40633 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly CLSID ASLR bypass download attempt RuleID : 40632 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded wrLoader ASLR bypass download attempt RuleID : 40631 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader ASLR bypass download attempt RuleID : 40630 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 40629 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 40628 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader CLSID ASLR bypass download attempt RuleID : 40627 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader ASLR bypass download attempt RuleID : 40626 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRAssembly CLSID ASLR bypass download attempt RuleID : 40625 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded wrLoader ASLR bypass download attempt RuleID : 40624 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader ASLR bypass download attempt RuleID : 40623 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader CLSID ASLR bypass download attempt RuleID : 40622 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader ASLR bypass download attempt RuleID : 40621 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRAssembly CLSID ASLR bypass download attempt RuleID : 40620 - Revision : 2 - Type : FILE-OFFICE |
2016-07-12 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39529-community - Revision : 4 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39529 - Revision : 4 - Type : FILE-OFFICE |
2016-07-12 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39528-community - Revision : 4 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39528 - Revision : 4 - Type : FILE-OFFICE |
2016-07-12 | RTF document incorrect file magic attempt RuleID : 39527-community - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | RTF document incorrect file magic attempt RuleID : 39527 - Revision : 2 - Type : FILE-OFFICE |
2016-07-12 | RTF document incorrect file magic attempt RuleID : 39526-community - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | RTF document incorrect file magic attempt RuleID : 39526 - Revision : 2 - Type : FILE-OFFICE |
2016-04-20 | RFT document malformed header RuleID : 38581-community - Revision : 2 - Type : FILE-OFFICE |
2016-05-25 | RFT document malformed header RuleID : 38581 - Revision : 2 - Type : FILE-OFFICE |
2016-04-20 | RFT document malformed header RuleID : 38580-community - Revision : 2 - Type : FILE-OFFICE |
2016-05-25 | RFT document malformed header RuleID : 38580 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 36245 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 36244 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF out-of-bounds array access remote code execution attempt RuleID : 34094 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF out-of-bounds array access remote code execution attempt RuleID : 34093 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF double-free remote code execution attempt RuleID : 34087 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF double-free remote code execution attempt RuleID : 34086 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 34067 - Revision : 3 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 34066 - Revision : 3 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office Word document memory corruption attempt RuleID : 34063 - Revision : 3 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office Word document memory corruption attempt RuleID : 34062 - Revision : 4 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-04-14 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms15-033_office_2011.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : An application installed on the remote Mac OS X host is affected by a cross-s... File : macosx_ms15-033_outlook_for_office365.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : The remote host is affected by multiple remote code execution vulnerabilities. File : smb_nt_ms15-033.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:45:58 |
|
2021-05-04 12:38:38 |
|
2021-04-22 01:47:21 |
|
2020-05-23 00:44:30 |
|
2018-10-13 05:18:52 |
|
2016-04-27 02:08:18 |
|
2015-10-18 17:23:35 |
|
2015-09-17 00:22:45 |
|
2015-05-14 21:26:31 |
|
2015-04-30 09:27:56 |
|
2015-04-24 00:27:48 |
|
2015-04-22 00:28:48 |
|
2015-04-21 09:27:39 |
|
2015-04-16 05:27:07 |
|
2015-04-15 13:28:27 |
|
2015-04-15 05:28:32 |
|