Executive Summary
This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations | |||
---|---|---|---|
Name | MS06-027 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.6 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability in Microsoft Word Could Allow Remote Code Execution (917336) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1418 | |||
Oval ID: | oval:org.mitre.oval:def:1418 | ||
Title: | Microsoft Word2003 Malformed Object Pointer Vulnerability | ||
Description: | Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2492 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Word |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1738 | |||
Oval ID: | oval:org.mitre.oval:def:1738 | ||
Title: | Microsoft Word2002 Malformed Object Pointer Vulnerability | ||
Description: | Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2492 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Word |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:2068 | |||
Oval ID: | oval:org.mitre.oval:def:2068 | ||
Title: | Microsoft Word2000 Malformed Object Pointer Vulnerability | ||
Description: | Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2492 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Word |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
25635 | Microsoft Word Unspecified Code Execution Microsoft Word contains a flaw that may allow a malicious user to execute arbitrary code under the security context of the current user. The issue is triggered due to an unspecified error when processing object pointers. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Office Word Smart Tags code execution attempt RuleID : 21677 - Revision : 5 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word Smart Tags code execution attempt RuleID : 21676 - Revision : 5 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word Smart Tags code execution attempt RuleID : 21675 - Revision : 5 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word Smart Tags code execution attempt RuleID : 21674 - Revision : 5 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-06-13 | Name : Arbitrary code can be executed on the remote host through Microsoft Word. File : smb_nt_ms06-027.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:23 |
|
2014-01-19 21:29:59 |
|