CERTA-2010-AVI-251
Vulnerability from certfr_avis - Published: - Updated:
Trois vulnérabilités ont été corrigées dans Microsoft SharePoint dont une révélée publiquement permettant une élévation de privilèges.
Description
Trois vulnérabilités ont été corrigées dans Microsoft SharePoint dont une révélée publiquement. Cette dernière permet à une personne malintentionnée d'élever ses privilèges au moyen d'un lien spécifiquement écrit.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Office | Microsoft Office InfoPath 2003 SP3 ; | ||
| Microsoft | Office | Microsoft Office InfoPath 2007 SP1 et SP2 ; | ||
| Microsoft | N/A | Microsoft SharePoint Service 3.0 SP1 et SP2 pour les versions 32 bits et 64 bits. | ||
| Microsoft | Office | Microsoft Office SharePoint 2007 SP1 et SP2 pour les versions 32 bits et 64 bits ; |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Office InfoPath 2003 SP3 ;",
"product": {
"name": "Office",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office InfoPath 2007 SP1 et SP2 ;",
"product": {
"name": "Office",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Service 3.0 SP1 et SP2 pour les versions 32 bits et 64 bits.",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office SharePoint 2007 SP1 et SP2 pour les versions 32 bits et 64 bits ;",
"product": {
"name": "Office",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nTrois vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Microsoft SharePoint dont\nune r\u00e9v\u00e9l\u00e9e publiquement. Cette derni\u00e8re permet \u00e0 une personne\nmalintentionn\u00e9e d\u0027\u00e9lever ses privil\u00e8ges au moyen d\u0027un lien\nsp\u00e9cifiquement \u00e9crit.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0817",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0817"
},
{
"name": "CVE-2010-1257",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1257"
},
{
"name": "CVE-2010-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1264"
}
],
"links": [],
"reference": "CERTA-2010-AVI-251",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Trois vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Microsoft SharePoint dont\nune r\u00e9v\u00e9l\u00e9e publiquement permettant une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Microsoft SharePoint",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS10-039 du 08 juin 2010",
"url": "http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…