CNVD-2016-00285
Vulnerability from cnvd - Published: 2016-01-19
VLAI Severity ?
Title
Microsoft Office安全机制绕过漏洞
Description
Microsoft Office是一套由Microsoft 公司开发的办公软件,它为Microsoft Windows和Apple Macintosh操作系统而开发。
Microsoft Office存在安全绕过漏洞,远程攻击者利用此漏洞可绕过ASLR保护机制,执行未授权操作。
Severity
中
Patch Name
Microsoft Office安全机制绕过漏洞的补丁
Patch Description
Microsoft Office是一套由Microsoft 公司开发的办公软件,它为Microsoft Windows和Apple Macintosh操作系统而开发。
Microsoft Office存在安全绕过漏洞,远程攻击者利用此漏洞可绕过ASLR保护机制,执行未授权操作。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://technet.microsoft.com/security/bulletin/MS16-004
Reference
http://technet.microsoft.com/security/bulletin/MS16-004
Impacted products
| Name | ['Microsoft Office 2007 SP3', 'Microsoft PowerPoint 2007 SP3', 'Microsoft Word 2007 SP3', 'Microsoft Excel 2007 SP3', 'Microsoft Excel 2010 SP2', 'Microsoft Word 2010 SP2', 'Microsoft Office 2010 SP2', 'Microsoft Office 2013 SP1', 'Microsoft Excel 2013 SP1', 'Microsoft Excel 2013 RT SP1', 'Microsoft PowerPoint 2010 SP2', 'Microsoft Word 2013 SP1', 'Microsoft Word 2013 RT SP1', 'Microsoft PowerPoint 2013 SP1', 'Microsoft Visio 2010 SP2', 'Microsoft Visio 2007 SP3', 'Microsoft Office 2016', 'Microsoft Visio 2013 SP1', 'Microsoft PowerPoint 2013 RT SP1', 'Microsoft Excel 2016', 'Microsoft Word 2016', 'Microsoft Visio 2016', 'Microsoft PowerPoint 2016', 'Microsoft Visual Basic 6.0 Runtime'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-0012"
}
},
"description": "Microsoft Office\u662f\u4e00\u5957\u7531Microsoft \u516c\u53f8\u5f00\u53d1\u7684\u529e\u516c\u8f6f\u4ef6\uff0c\u5b83\u4e3aMicrosoft Windows\u548cApple Macintosh\u64cd\u4f5c\u7cfb\u7edf\u800c\u5f00\u53d1\u3002\r\n\r\nMicrosoft Office\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u53ef\u7ed5\u8fc7ASLR\u4fdd\u62a4\u673a\u5236\uff0c\u6267\u884c\u672a\u6388\u6743\u64cd\u4f5c\u3002",
"discovererName": "Tom Kahana, Elad Menahem",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://technet.microsoft.com/security/bulletin/MS16-004",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-00285",
"openTime": "2016-01-19",
"patchDescription": "Microsoft Office\u662f\u4e00\u5957\u7531Microsoft \u516c\u53f8\u5f00\u53d1\u7684\u529e\u516c\u8f6f\u4ef6\uff0c\u5b83\u4e3aMicrosoft Windows\u548cApple Macintosh\u64cd\u4f5c\u7cfb\u7edf\u800c\u5f00\u53d1\u3002\r\n\r\nMicrosoft Office\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u53ef\u7ed5\u8fc7ASLR\u4fdd\u62a4\u673a\u5236\uff0c\u6267\u884c\u672a\u6388\u6743\u64cd\u4f5c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Office\u5b89\u5168\u673a\u5236\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Office 2007 SP3",
"Microsoft PowerPoint 2007 SP3",
"Microsoft Word 2007 SP3",
"Microsoft Excel 2007 SP3",
"Microsoft Excel 2010 SP2",
"Microsoft Word 2010 SP2",
"Microsoft Office 2010 SP2",
"Microsoft Office 2013 SP1",
"Microsoft Excel 2013 SP1",
"Microsoft Excel 2013 RT SP1",
"Microsoft PowerPoint 2010 SP2",
"Microsoft Word 2013 SP1",
"Microsoft Word 2013 RT SP1",
"Microsoft PowerPoint 2013 SP1",
"Microsoft Visio 2010 SP2",
"Microsoft Visio 2007 SP3",
"Microsoft Office 2016",
"Microsoft Visio 2013 SP1",
"Microsoft PowerPoint 2013 RT SP1",
"Microsoft Excel 2016",
"Microsoft Word 2016",
"Microsoft Visio 2016",
"Microsoft PowerPoint 2016",
"Microsoft Visual Basic 6.0 Runtime"
]
},
"referenceLink": "http://technet.microsoft.com/security/bulletin/MS16-004",
"serverity": "\u4e2d",
"submitTime": "2016-01-15",
"title": "Microsoft Office\u5b89\u5168\u673a\u5236\u7ed5\u8fc7\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…