CVE-2016-3279
Published Jul 13, 2016
Last updated 6 years ago
Overview
- Description
- Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Excel 2016, Word 2016, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted XLA file, aka "Microsoft Office Remote Code Execution Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-254
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E36D981E-E56D-46C7-9486-FC691A75C497" }, { "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F564117D-450D-45C4-9688-AF35F630A8A7" }, { "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF" }, { "criteria": "cpe:2.3:a:microsoft:excel_rt:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27745C7E-94A0-4C2A-8318-684CB85F48D2" }, { "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638" }, { "criteria": "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8235774-4B57-4793-BE26-2CDE67532EDD" }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CCB2D72-B779-4772-8F72-7177E3F47A92" }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA6E71BA-0EBA-40EE-8B81-92C6DECE8DB3" }, { "criteria": "cpe:2.3:a:microsoft:powerpoint_rt:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FA6DEE3-84A5-42DC-9C52-21A3986376C9" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73" }, { "criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492" }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA" }, { "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE" }, { "criteria": "cpe:2.3:a:microsoft:word_rt:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "558B8B5E-125A-4370-A6E9-3CB75808D7B3" } ], "operator": "OR" } ] } ]