CVE-2016-0056
Published on: 02/10/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:13 PM UTC
Certain versions of Office from Microsoft contain the following vulnerability:
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
- CVE-2016-0056 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
LOCAL | LOW | NONE | REQUIRED | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 9.3 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Microsoft Security Bulletin MS16-015 - Critical | Microsoft Docs | docs.microsoft.com text/html |
![]() |
Microsoft Office File Processing Flaws Let Remote Users Execute Arbitrary Code - SecurityTracker | www.securitytracker.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Microsoft | Office | 2010 | sp2 | x64 | All |
Application | Microsoft | Office | 2010 | sp2 | x86 | All |
Application | Microsoft | Office | 2010 | sp2 | x64 | All |
Application | Microsoft | Office | 2010 | sp2 | x86 | All |
Application | Microsoft | Office Compatibility Pack | All | sp3 | All | All |
Application | Microsoft | Office Compatibility Pack | All | sp3 | All | All |
Application | Microsoft | Word | 2007 | sp3 | All | All |
Application | Microsoft | Word | 2010 | sp2 | All | All |
Application | Microsoft | Word | 2013 | sp1 | All | All |
Application | Microsoft | Word | 2013 | sp1 | All | All |
Application | Microsoft | Word | 2016 | All | All | All |
Application | Microsoft | Word | 2007 | sp3 | All | All |
Application | Microsoft | Word | 2010 | sp2 | All | All |
Application | Microsoft | Word | 2013 | sp1 | All | All |
Application | Microsoft | Word | 2013 | sp1 | All | All |
Application | Microsoft | Word | 2016 | All | All | All |
- cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*:
- cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*:
- cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*:
- cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*:
- cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*:
- cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*:
- cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*:
- cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE