CVE-2015-2423
Summary
| CVE | CVE-2015-2423 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-08-15 00:59:00 UTC |
| Updated | 2019-05-15 11:53:00 UTC |
| Description | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Visio 2013 RT SP1, Word 2013 RT SP1, and Internet Explorer 7 through 11 allow remote attackers to gain privileges and obtain sensitive information via a crafted command-line parameter to an Office application or Notepad, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Unsafe Command Line Parameter Passing Vulnerability." |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Microsoft | Excel | 2007 | sp3 | All | All |
| Application | Microsoft | Excel | 2010 | sp2 | All | All |
| Application | Microsoft | Excel | 2013 | sp1 | All | All |
| Application | Microsoft | Excel | 2013 | sp1 | All | All |
| Application | Microsoft | Excel | 2007 | sp3 | All | All |
| Application | Microsoft | Excel | 2010 | sp2 | All | All |
| Application | Microsoft | Excel | 2013 | sp1 | All | All |
| Application | Microsoft | Excel | 2013 | sp1 | All | All |
| Application | Microsoft | Internet Explorer | 10 | All | All | All |
| Application | Microsoft | Internet Explorer | 11 | - | All | All |
| Application | Microsoft | Internet Explorer | 7 | All | All | All |
| Application | Microsoft | Internet Explorer | 8 | All | All | All |
| Application | Microsoft | Internet Explorer | 9 | All | All | All |
| Application | Microsoft | Internet Explorer | 10 | All | All | All |
| Application | Microsoft | Internet Explorer | 11 | - | All | All |
| Application | Microsoft | Internet Explorer | 7 | All | All | All |
| Application | Microsoft | Internet Explorer | 8 | All | All | All |
| Application | Microsoft | Internet Explorer | 9 | All | All | All |
| Application | Microsoft | Office | 2010 | sp2 | All | All |
| Application | Microsoft | Office | 2010 | sp2 | All | All |
| Application | Microsoft | Powerpoint | 2007 | sp3 | All | All |
| Application | Microsoft | Powerpoint | 2010 | sp2 | All | All |
| Application | Microsoft | Powerpoint | 2013 | sp1 | All | All |
| Application | Microsoft | Powerpoint | 2013 | sp1 | All | All |
| Application | Microsoft | Powerpoint | 2007 | sp3 | All | All |
| Application | Microsoft | Powerpoint | 2010 | sp2 | All | All |
| Application | Microsoft | Powerpoint | 2013 | sp1 | All | All |
| Application | Microsoft | Powerpoint | 2013 | sp1 | All | All |
| Application | Microsoft | Visio | 2007 | sp3 | All | All |
| Application | Microsoft | Visio | 2010 | sp2 | All | All |
| Application | Microsoft | Visio | 2013 | sp1 | All | All |
| Application | Microsoft | Visio | 2013 | sp1 | All | All |
| Application | Microsoft | Visio | 2016 | All | All | All |
| Application | Microsoft | Visio | 2007 | sp3 | All | All |
| Application | Microsoft | Visio | 2010 | sp2 | All | All |
| Application | Microsoft | Visio | 2013 | sp1 | All | All |
| Application | Microsoft | Visio | 2013 | sp1 | All | All |
| Application | Microsoft | Visio | 2016 | All | All | All |
| Operating System | Microsoft | Windows 10 | - | All | All | All |
| Operating System | Microsoft | Windows 10 | - | All | All | All |
| Operating System | Microsoft | Windows 7 | - | sp1 | All | All |
| Operating System | Microsoft | Windows 7 | - | sp1 | All | All |
| Operating System | Microsoft | Windows 8 | - | All | All | All |
| Operating System | Microsoft | Windows 8 | - | All | All | All |
| Operating System | Microsoft | Windows 8.1 | - | All | All | All |
| Operating System | Microsoft | Windows 8.1 | - | All | All | All |
| Operating System | Microsoft | Windows Rt | - | All | All | All |
| Operating System | Microsoft | Windows Rt | - | All | All | All |
| Operating System | Microsoft | Windows Rt 8.1 | - | All | All | All |
| Operating System | Microsoft | Windows Rt 8.1 | - | All | All | All |
| Operating System | Microsoft | Windows Server 2008 | - | sp2 | All | All |
| Operating System | Microsoft | Windows Server 2008 | r2 | sp1 | All | All |
| Operating System | Microsoft | Windows Server 2008 | r2 | sp1 | All | All |
| Operating System | Microsoft | Windows Server 2008 | - | sp2 | All | All |
| Operating System | Microsoft | Windows Server 2008 | r2 | sp1 | All | All |
| Operating System | Microsoft | Windows Server 2008 | r2 | sp1 | All | All |
| Operating System | Microsoft | Windows Server 2012 | - | All | All | All |
| Operating System | Microsoft | Windows Server 2012 | r2 | All | All | All |
| Operating System | Microsoft | Windows Server 2012 | - | All | All | All |
| Operating System | Microsoft | Windows Server 2012 | r2 | All | All | All |
| Operating System | Microsoft | Windows Vista | - | sp2 | All | All |
| Operating System | Microsoft | Windows Vista | - | sp2 | All | All |
| Application | Microsoft | Word | 2007 | sp3 | All | All |
| Application | Microsoft | Word | 2010 | sp2 | All | All |
| Application | Microsoft | Word | 2013 | sp1 | All | All |
| Application | Microsoft | Word | 2013 | sp1 | All | All |
| Application | Microsoft | Word | 2016 | All | All | All |
| Application | Microsoft | Word | 2007 | sp3 | All | All |
| Application | Microsoft | Word | 2010 | sp2 | All | All |
| Application | Microsoft | Word | 2013 | sp1 | All | All |
| Application | Microsoft | Word | 2013 | sp1 | All | All |
| Application | Microsoft | Word | 2016 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Microsoft Security Bulletin MS15-079 - Critical | Microsoft Docs | MS | docs.microsoft.com | Patch, Vendor Advisory |
| Microsoft Internet Explorer Multiple Bugs Let Remote Users Bypass ASLR, Obtain Potentially Sensitive Information, and Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Microsoft Security Bulletin MS15-088 - Important | Microsoft Docs | MS | docs.microsoft.com | Patch, Vendor Advisory |
| Microsoft Security Bulletin MS15-081 - Critical | Microsoft Docs | MS | docs.microsoft.com | Patch, Vendor Advisory |
| Microsoft Windows Command Line Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Microsoft Office Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.