Show plain JSON{"id": "CVE-2015-0085", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2015-03-11T10:59:12.533", "references": [{"url": "http://www.securitytracker.com/id/1031896", "source": "secure@microsoft.com"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", "source": "secure@microsoft.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Component Use After Free Vulnerability.\""}, {"lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold y SP1, Office 2013 RT Gold y SP1, Word 2013 RT Gold y SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold y SP1, Word Automation Services on SharePoint Server 2013 Gold y SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold y SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold y SP1, y SharePoint Server 2013 Gold y SP1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento de Office manipulado, tambi\u00e9n conocido como 'vulnerabilidad del uso despu\u00e9s de liberaci\u00f3n de componentes de Microsoft Office.'"}], "lastModified": "2018-10-12T22:08:22.460", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94F5E2F8-0D37-4FCC-B55A-9F09C421272C"}, {"criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "E28626D8-AF3A-487F-BAAB-3955E44D2A35"}, {"criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:x86:*:*", "vulnerable": true, "matchCriteriaId": "3C4CFF7E-7170-4A6B-9A59-9815EE896C62"}, {"criteria": "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "971EC323-267F-4DAF-BA3B-10A47A9F1ADA"}, {"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "BB0CF266-A7EE-474A-B3D3-4A7FE33F4C2C"}, {"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "DC25ACD6-8F48-4534-AF7B-53F0D10C0843"}, {"criteria": "cpe:2.3:a:microsoft:office:2013:*:*:*:gold:*:*:*", "vulnerable": true, "matchCriteriaId": "F4C9D0D2-4D72-4712-8056-9EDDF741723B"}, {"criteria": "cpe:2.3:a:microsoft:office:2013:*:*:*:rt_gold:*:*:*", "vulnerable": true, "matchCriteriaId": "6DF78996-DFB3-4102-9E98-FF2B56FB67B1"}, {"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "120690A6-E0A1-4E36-A35A-C87109ECC064"}, {"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44BC7B7B-7191-431C-8CAE-83B3F0EFF03E"}, {"criteria": "cpe:2.3:a:microsoft:office_web_apps_server:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84149DF3-54BA-4738-9386-6C29B4E9448F"}, {"criteria": "cpe:2.3:a:microsoft:office_web_apps_server:2013:*:*:*:gold:*:*:*", "vulnerable": true, "matchCriteriaId": "8252ABD2-4FC5-4C7F-9A73-625B47EA980B"}, {"criteria": "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "941B16A2-931D-4031-A016-5EA60E87BE20"}, {"criteria": "cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE2E98C5-71A4-4014-AFC4-5438FEC196D2"}, {"criteria": "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CCB2D72-B779-4772-8F72-7177E3F47A92"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81443CAD-F47E-4FD1-8E0E-8D646C90E4E3"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:2013:-:-:*:gold:*:*:*", "vulnerable": true, "matchCriteriaId": "A9626946-8339-4E06-BBF6-904D0ACC5ACF"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F71184B1-7461-4A05-A5D2-03D9EDDC30D5"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B7AEA5E-C3D7-4E6D-96F0-5F9A175631C9"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2013:-:-:*:gold:*:*:*", "vulnerable": true, "matchCriteriaId": "90DBE271-001E-4783-86F5-E14977F95F13"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F33176-442C-4EFF-8EA0-C640D203B939"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_services:3.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70F505C4-2D2D-4336-95C0-78644F2C5636"}, {"criteria": "cpe:2.3:a:microsoft:web_applications:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC93E283-E88A-41F1-90B6-CD256FF02F11"}, {"criteria": "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D006508-BFB0-4F21-A361-3DA644F51D8A"}, {"criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492"}, {"criteria": "cpe:2.3:a:microsoft:word:2013:*:*:*:gold:*:*:*", "vulnerable": true, "matchCriteriaId": "E625EEC9-52BF-49F9-BD10-CA1E2FF0B227"}, {"criteria": "cpe:2.3:a:microsoft:word:2013:*:*:*:rt_gold:*:*:*", "vulnerable": true, "matchCriteriaId": "004A33A3-2DE6-4DEE-9350-BE0C233F4A51"}, {"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA"}], "operator": "OR"}]}], "evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "sourceIdentifier": "secure@microsoft.com"}