CVE-2015-1649
Published Apr 14, 2015
Last updated 6 years ago
Overview
- Description
- Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69998A67-CB15-4217-8AD6-43F9BA3C6454" }, { "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "349E9084-8116-43E9-8B19-CA521C96660D" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44BC7B7B-7191-431C-8CAE-83B3F0EFF03E" }, { "criteria": "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8235774-4B57-4793-BE26-2CDE67532EDD" }, { "criteria": "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3C3FC9A-D8E5-493A-A575-C831A9A28815" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F33176-442C-4EFF-8EA0-C640D203B939" }, { "criteria": "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D006508-BFB0-4F21-A361-3DA644F51D8A" }, { "criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492" }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "vulnerable": true, "matchCriteriaId": "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F" }, { "criteria": "cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D79B6572-E7DF-4CC2-B70B-9B31BE1B6A81" } ], "operator": "OR" } ] } ]