- Description
- Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Data from CISA
- Vulnerability name
- Microsoft PowerPoint Memory Corruption Vulnerability
- Exploit added on
- Mar 3, 2022
- Exploit action due
- Mar 24, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E4635DA5-27DA-43FF-92AC-A9F80218A2F0"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FEECD12A-5BEF-4675-B62E-86CF4A7474D7"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*",
"vulnerable": true,
"matchCriteriaId": "BCB90D64-B7B2-4301-91E3-A113569371F2"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "552E1557-D6FA-45DD-9B52-E13ACDBB8A62"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F7DDFFB8-2337-4DD7-8120-56CC8EF134B4"
},
{
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "71AF058A-2E5D-4B11-88DB-8903C64B13C1"
},
{
"criteria": "cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AE2E98C5-71A4-4014-AFC4-5438FEC196D2"
},
{
"criteria": "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9CCB2D72-B779-4772-8F72-7177E3F47A92"
},
{
"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA"
},
{
"criteria": "cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7AC45CB0-6C84-46D3-B16D-170D46822E54"
}
],
"operator": "OR"
}
]
}
]