CVE编号
CVE-2007-0515利用情况
暂无补丁情况
N/A披露时间
2007-01-26漏洞描述
Unspecified vulnerability in Microsoft Word allows user-assisted remote attackers to execute arbitrary code on Word 2000, and cause a denial of service on Word 2003, via unknown attack vectors that trigger memory corruption, as exploited by Trojan.Mdropper.W and later by Trojan.Mdropper.X, a different issue than CVE-2006-6456, CVE-2006-5994, and CVE-2006-6561.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://isc.sans.org/diary.html?storyid=2133 | |
http://osvdb.org/31900 | |
http://secunia.com/advisories/23950 | |
http://securitytracker.com/id?1017564 | |
http://www.kb.cert.org/vuls/id/412225 | |
http://www.microsoft.com/technet/security/advisory/932114.mspx | |
http://www.securityfocus.com/bid/22225 | |
http://www.securityfocus.com/bid/22328 | |
http://www.symantec.com/enterprise/security_response/weblog/2007/01/multiple_... | |
http://www.symantec.com/enterprise/security_response/weblog/2007/01/new_micro... | |
http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2007-0... | |
http://www.us-cert.gov/cas/techalerts/TA07-044A.html | |
http://www.vupen.com/english/advisories/2007/0350 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31834 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | microsoft | office | 2000 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | 2003 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | 2004 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | xp | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | word | 2000 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | word | 2002 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | word | 2003 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | word_viewer | 2003 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | works | 2004 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | works | 2005 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | works | 2006 | - |
- 攻击路径 网络
- 攻击复杂度 N/A
- 权限要求 无
- 影响范围 N/A
- 用户交互 需要
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...