Overview
- Description
- Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Microsoft XML Core Services Memory Corruption Vulnerability
- Exploit added on
- Jun 8, 2022
- Exploit action due
- Jun 22, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-787
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73052210-0B42-46AA-9F28-AAE3E9B6DE87" }, { "criteria": "cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C9B9BE3-6F83-469E-834F-3E00CFECD8E2" }, { "criteria": "cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4170FCB7-274C-4318-B7A1-8F18DE604A2D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51" }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", "vulnerable": false, "matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B91A0AA-44C0-4ED8-A7AC-54C9C83FFEFE" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:expression_web:2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F6761A1C-EC1C-4B00-8126-D58DAB51267A" }, { "criteria": "cpe:2.3:a:microsoft:expression_web:sp1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8038BCE0-23C5-4A73-B4B3-A1143DE9C1A1" }, { "criteria": "cpe:2.3:a:microsoft:groove:2007:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5075B5F5-5018-4DEF-B77D-E75C09CB3DF3" }, { "criteria": "cpe:2.3:a:microsoft:groove:2007:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F73CE423-638E-406F-AD0A-84049B56DA8C" }, { "criteria": "cpe:2.3:a:microsoft:groove_server:2007:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8D61B21F-E1A1-421A-BA3E-5D0D294A4325" }, { "criteria": "cpe:2.3:a:microsoft:groove_server:2007:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "11874823-F6B3-4948-9A7B-FA903EF31005" }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E" }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08AF794A-435D-4171-9DBB-EB7FAED96DBA" }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FEECD12A-5BEF-4675-B62E-86CF4A7474D7" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55AA5CC4-AF80-49A2-ACD1-5644AA971044" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71AF058A-2E5D-4B11-88DB-8903C64B13C1" }, { "criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9C24FB09-DBAD-4F62-BBD6-B81B9EC83D56" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6B7AEA5E-C3D7-4E6D-96F0-5F9A175631C9" } ], "operator": "OR" } ], "operator": "AND" } ]