mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
199 lines
6.8 KiB
JSON
199 lines
6.8 KiB
JSON
{
|
|
"id": "CVE-2006-3647",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2006-10-10T22:07:00.000",
|
|
"lastModified": "2018-10-18T16:48:43.677",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Integer overflow in Microsoft Word 2000, 2002, 2003, 2004 for Mac, and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string in a Word document, which overflows a 16-bit integer length value, aka \"Memmove Code Execution,\" a different vulnerability than CVE-2006-3651 and CVE-2006-4693."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de entero en Microsoft Word 2000, 2002, 2003, 2004 para Mac, y v.X para Mac permite a usuarios remotos con la complicidad del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante una cadena artesanal en un fichero Word, lo que desborda la longitud del valor de un entero de 16-bit, tambi\u00e9n conocido como \"Memmove Code Execution\", una vulnerabilidad diferente que CVE-2006-3651 y CVE-2006-4693."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9A82D13-513C-46FA-AF51-0582233E230A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*",
|
|
"matchCriteriaId": "757EC6C1-F5E2-45CD-9F7F-7760ECEDC842"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*",
|
|
"matchCriteriaId": "59B1B68C-86F1-4FA4-9F82-3E8761ED1E74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*",
|
|
"matchCriteriaId": "716DDA05-D094-4837-852C-0511CDDD5ABC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C54DDAF-8D7F-4A7D-9186-6048D4C850B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "67388076-420D-4327-A436-329177EA6F42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2001:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64B3099E-DFA0-4C7E-B016-370028BF8387"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2001:*:*:*:*:mac_os_x:*:*",
|
|
"matchCriteriaId": "DCBB9A94-1CF8-485D-9694-90E1C51AADE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2001:sr1:*:*:*:mac_os_x:*:*",
|
|
"matchCriteriaId": "27BB6CEC-C0F7-45BB-BE9A-60489E16CCFC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:*:*:*:student_teacher:*:*:*",
|
|
"matchCriteriaId": "ADD36A6D-10D8-4E06-899A-70FF822DAD15"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4EED9D78-AE73-44BA-A1CE-603994E92E89"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os_x:*:*",
|
|
"matchCriteriaId": "A78DC369-DCAE-4D75-8C33-0FFF108640F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "310DF9B3-3494-4BD4-8A9D-82211EA6C518"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0211.html",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Broken Link"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1017032",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/448417/100/0/threaded",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/20341",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3979",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |