mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
150 lines
5.4 KiB
JSON
150 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2011-0097",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2011-04-13T18:55:01.080",
|
|
"lastModified": "2018-10-12T21:59:27.790",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted 400h substream in an Excel file, which triggers a stack-based buffer overflow, aka \"Excel Integer Overrun Vulnerability.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Un desbordamiento de enteros en Excel 2002 SP3, 2003 SP3, 2007 SP2, y 2010; Office 2004 y 2008 para Mac; Open XML File Format Converter para Mac; Excel Viewer SP2; y Office Compatibility Pack para Word, Excel, y PowerPoint 2007 File Formats SP2, de Microsoft , permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una subcorriente 400h dise\u00f1ada en un archivo de Excel, que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria, tambi\u00e9n se conoce como \"Excel Integer Overrun Vulnerability.\""
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:excel:-:-:x64:*:*:*:*:*",
|
|
"matchCriteriaId": "A7870548-E23F-469A-B205-BB30E49718B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "896E23B1-AB34-43FF-96F3-BA6ED7F162AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEBB33CD-CACF-4EB8-8B5F-8E1CB8D7A440"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "273729C3-56BF-454A-8697-473094EA828F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98BF87B2-CE8F-4977-9436-9BE5821CF1B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:excel_viewer:-:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9AEBCD21-942F-44A9-B77E-8FC944F969F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
|
|
"matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
|
|
"matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4B44889-AEEB-4713-A047-C27B802DB257"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
|
|
"matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/47201",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1025337",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0940",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12612",
|
|
"source": "secure@microsoft.com"
|
|
}
|
|
]
|
|
} |