mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
182 lines
6.5 KiB
JSON
182 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2006-3435",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2006-10-10T21:07:00.000",
|
|
"lastModified": "2018-10-30T16:25:26.903",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "PowerPoint in Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac does not properly parse the slide notes field in a document, which allows remote user-assisted attackers to execute arbitrary code via crafted data in this field, which triggers an erroneous object pointer calculation that uses data from within the document. NOTE: this issue is different than other PowerPoint vulnerabilities including CVE-2006-4694."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "PowerPoint en Microsoft Office 2000, XP, 2003, 2004 para Mac, y v.X para Mac no analiza adecuadamente el campo de notas de diapositiva en un documento, lo cual permite a atacantes con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante datos manipulados en este campo, lo cual dispara un c\u00e1lculo err\u00f3neo de puntero de objeto que utiliza datos de dentro del documento. NOTA: este problema es diferente de otras vulnerabilidades PowerPoint incluyendo CVE-2006-4694."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-94"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9A82D13-513C-46FA-AF51-0582233E230A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C54DDAF-8D7F-4A7D-9186-6048D4C850B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "67388076-420D-4327-A436-329177EA6F42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB7EA4CC-E705-42DB-86B6-E229DA36B66D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4EED9D78-AE73-44BA-A1CE-603994E92E89"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
|
|
"matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "310DF9B3-3494-4BD4-8A9D-82211EA6C518"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:xp:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34FA62BE-D804-402D-9BDD-68BC70ECCD76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AB85A3C-EFA3-485D-84C5-7976718AEAE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D02D769-061D-44A5-B019-F4E653DF615A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securitytracker.com/id?1017030",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/187028",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/448149/100/0/threaded",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/20304",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3977",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-032.html",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A476",
|
|
"source": "secure@microsoft.com"
|
|
}
|
|
]
|
|
} |