René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

121 lines
3.9 KiB
JSON

{
"id": "CVE-2008-0103",
"sourceIdentifier": "secure@microsoft.com",
"published": "2008-02-13T00:00:00.000",
"lastModified": "2018-10-12T21:44:49.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a \"memory handling error,\" aka \"Microsoft Office Execution Jump Vulnerability.\""
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2 y Office 2004 para Mac. Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un documento de Office que contiene un objeto mal formado, relacionado con un \"error de gesti\u00f3n de memoria\" tambi\u00e9n conocido como \"Microsoft Office Execution Jump Vulnerability.\""
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2004:*:mac\\+os:*:*:*:*:*",
"matchCriteriaId": "E681CCF5-F7B3-4BBC-B013-E566D84F5880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
"matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=120361015026386&w=2",
"source": "secure@microsoft.com"
},
{
"url": "http://www.securityfocus.com/bid/27738",
"source": "secure@microsoft.com"
},
{
"url": "http://www.securitytracker.com/id?1019375",
"source": "secure@microsoft.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-043C.html",
"source": "secure@microsoft.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0515/references",
"source": "secure@microsoft.com"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-013",
"source": "secure@microsoft.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5407",
"source": "secure@microsoft.com"
}
]
}