CVE-2019-0585
Published Jan 8, 2019
Last updated 4 years ago
Overview
- Description
- A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft SharePoint, Microsoft Office Online Server, Microsoft Word, Microsoft SharePoint Server.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638" }, { "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os_x:*:*", "vulnerable": true, "matchCriteriaId": "04435803-F25B-4384-8ADD-001E87F5813A" }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "40961B9E-80B6-42E0-A876-58B3CE056E4E" }, { "criteria": "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA035812-F35A-43F1-9A8D-EE02201AA10A" }, { "criteria": "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E98AE986-FA31-4301-8025-E8915BA4AC5E" }, { "criteria": "cpe:2.3:a:microsoft:office_web_apps_server:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84149DF3-54BA-4738-9386-6C29B4E9448F" }, { "criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "157CBD57-8A1B-4B57-8371-88EF4254A663" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4" }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" }, { "criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492" }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA" }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "vulnerable": true, "matchCriteriaId": "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F" }, { "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE" }, { "criteria": "cpe:2.3:a:microsoft:word_automation_services:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC865581-3650-4DC4-9138-C2F71AA3B850" } ], "operator": "OR" } ] } ]