mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-30 07:45:07 +00:00
131 lines
5.0 KiB
JSON
131 lines
5.0 KiB
JSON
{
|
|
"id": "CVE-2012-1854",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2012-07-10T21:55:05.587",
|
|
"lastModified": "2018-10-12T22:02:45.903",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka \"Visual Basic for Applications Insecure Library Loading Vulnerability,\" as exploited in the wild in July 2012."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de b\u00fasqueda de ruta no confiable (\"Untrusted search path\") en VBE6.dll en Microsoft Office 2003 SP3, 2007 SP2 y SP3, y 2010 Gold y SP1; Microsoft Visual Basic para Applications (VBA); y Summit Microsoft Visual Basic para Applications SDK permite a usuarios locales conseguir privilegios a trav\u00e9s de un troyano dll en el directorio de trabajo actual, como lo demuestra un directorio que contiene un archivo. docx, tambi\u00e9n conocido como vulnerabilidad \"Visual Basic para la carga de librer\u00edas inseguras\",\" como fue explotado en julio de 2012."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.9
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08AF794A-435D-4171-9DBB-EB7FAED96DBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEECD12A-5BEF-4675-B62E-86CF4A7474D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2010:*:x86:*:*:*:*:*",
|
|
"matchCriteriaId": "A0CF7572-79BA-4576-ADED-528D17809071"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9932C177-FCBB-4AD1-A42A-1FAB28F392F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*",
|
|
"matchCriteriaId": "8239CEF1-BD02-4ACE-A0C2-75A9EAA15914"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*",
|
|
"matchCriteriaId": "8383FADC-9391-4570-AAF9-92A952A4F04F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:visual_basic_for_applications:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "390665EF-39A5-4FB7-93D1-CC5D3DEDEB93"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:visual_basic_for_applications_sdk:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99D0A944-E18D-4E24-8614-CE82FD201384"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14950",
|
|
"source": "secure@microsoft.com"
|
|
}
|
|
]
|
|
} |