Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-6091 | First vendor Publication | 2015-11-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6091 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 5 | |
Application | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Microsoft Outlook for Mac EML file http-equiv refresh url attempt RuleID : 36767 - Revision : 2 - Type : FILE-OTHER |
2016-03-14 | Microsoft Outlook for Mac EML file http-equiv refresh url attempt RuleID : 36766 - Revision : 2 - Type : FILE-OTHER |
2016-03-14 | Microsoft Office Excel MdCallBack out of bounds read attempt RuleID : 36752 - Revision : 6 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Excel MdCallBack out of bounds read attempt RuleID : 36751 - Revision : 6 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word FGetCpFlowDr memory corruption attempt RuleID : 36741 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word FGetCpFlowDr memory corruption attempt RuleID : 36740 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word CoCreateInstance elevation of privilege attempt RuleID : 36721 - Revision : 3 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word CoCreateInstance elevation of privilege attempt RuleID : 36720 - Revision : 3 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word PmwdFromDoc use after free attempt RuleID : 36717 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word PmwdFromDoc use after free attempt RuleID : 36716 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Excel slicer style use-after-free attempt RuleID : 36715 - Revision : 3 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Excel slicer style use-after-free attempt RuleID : 36714 - Revision : 3 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office malformed odttf integer overflow attempt RuleID : 36708 - Revision : 3 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office malformed odttf integer overflow attempt RuleID : 36707 - Revision : 3 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-11-10 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms15-116_office.nasl - Type : ACT_GATHER_INFO |
2015-11-10 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms15-116.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:49:13 |
|
2021-05-04 12:41:23 |
|
2021-04-22 01:50:17 |
|
2020-05-23 00:46:22 |
|
2018-10-13 05:18:57 |
|
2016-12-07 21:24:44 |
|
2015-11-12 21:24:29 |
|
2015-11-11 17:23:38 |
|