fkie_cve-2014-1761
Vulnerability from fkie_nvd
Published
2014-03-25 13:24
Modified
2025-02-10 20:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://technet.microsoft.com/security/advisory/2953095 | Patch, Vendor Advisory | |
secure@microsoft.com | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://technet.microsoft.com/security/advisory/2953095 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | office | 2011 | |
microsoft | office_compatibility_pack | - | |
microsoft | office_web_apps | 2010 | |
microsoft | office_web_apps | 2010 | |
microsoft | office_web_apps_server | 2013 | |
microsoft | sharepoint_server | 2010 | |
microsoft | sharepoint_server | 2010 | |
microsoft | sharepoint_server | 2013 | |
microsoft | word | 2003 | |
microsoft | word | 2007 | |
microsoft | word | 2010 | |
microsoft | word | 2010 | |
microsoft | word | 2013 | |
microsoft | word | 2013 | |
microsoft | word | 2013 | |
microsoft | word | 2013 | |
microsoft | word_viewer | - |
{ cisaActionDue: "2022-08-15", cisaExploitAdd: "2022-02-15", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Microsoft Word Memory Corruption Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*", matchCriteriaId: "BCB90D64-B7B2-4301-91E3-A113569371F2", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", matchCriteriaId: "71AF058A-2E5D-4B11-88DB-8903C64B13C1", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*", matchCriteriaId: "343EEB54-C1B1-4D7B-8780-5B5A5F2F840C", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", matchCriteriaId: "A8235774-4B57-4793-BE26-2CDE67532EDD", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:office_web_apps_server:2013:*:*:*:*:*:*:*", matchCriteriaId: "69B10C34-0A0D-4CDD-A2F1-A751B90F4C99", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*", matchCriteriaId: "6FA65D4A-00C8-47E2-AF9F-6B420017CD29", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", matchCriteriaId: "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:sharepoint_server:2013:*:*:*:*:*:*:*", matchCriteriaId: "993E5C5C-4C78-4CDA-BF67-5A35814EF621", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*", matchCriteriaId: "80F8E09E-E7F7-4D86-B140-3933EDC54E1C", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", matchCriteriaId: "7D006508-BFB0-4F21-A361-3DA644F51D8A", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2010:sp1:*:*:*:*:*:*", matchCriteriaId: "D2A0758C-6499-407F-823A-6F28BE56805E", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", matchCriteriaId: "24EEDAD9-9656-4B21-82E4-D60B83777492", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2013:*:*:*:-:*:*:*", matchCriteriaId: "E4CD4956-7280-4187-B613-A97B4B32941C", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2013:*:*:*:rt:*:*:*", matchCriteriaId: "3C81544A-00F9-4B20-B679-CFE60D5B23CB", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*", matchCriteriaId: "D7A48E44-F01A-40AD-B8AF-8FE368248003", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", matchCriteriaId: "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*", matchCriteriaId: "7AC45CB0-6C84-46D3-B16D-170D46822E54", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.", }, { lang: "es", value: "Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 y SP2, 2013 y 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office para Mac 2011; Word Automation Services en SharePoint Server 2010 SP1 y SP2 y 2013; Office Web Apps 2010 SP1 y SP2 y Office Web Apps Server 2013 permiten a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de datos RTF manipulados, tal y como fue explotado en marzo 2014.", }, ], id: "CVE-2014-1761", lastModified: "2025-02-10T20:15:35.730", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2014-03-25T13:24:01.067", references: [ { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://technet.microsoft.com/security/advisory/2953095", }, { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://technet.microsoft.com/security/advisory/2953095", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.