Show plain JSON{"id": "CVE-2013-3847", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2013-09-11T14:03:48.210", "references": [{"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A", "tags": ["Third Party Advisory", "US Government Resource"], "source": "secure@microsoft.com"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-067", "source": "secure@microsoft.com"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-072", "source": "secure@microsoft.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18749", "source": "secure@microsoft.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18988", "source": "secure@microsoft.com"}, {"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-067", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-072", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18749", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18988", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Microsoft Word Automation Services in SharePoint Server 2010 SP1, Word Web App 2010 SP1 in Office Web Apps 2010, Word 2003 SP3, Word 2007 SP3, Word 2010 SP1, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka \"Word Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3848, CVE-2013-3849, and CVE-2013-3858."}, {"lang": "es", "value": "Microsoft Word Automation Services en SharePoint Server 2010 SP1, Word Web App 2010 SP1 en Office Web Apps 2010, Word 2003 SP3, Word 2007 SP3, Word 2010 SP1, Office Compatibility Pack SP3, y Word Viewer permiten a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un documento de Office manipulado. Aka \"Word Memory Corruption Vulnerability\", una vulnerabilidad diferente de CVE-2013-3848, CVE-2013-3849, y CVE-2013-3858."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C86EA4A-7108-4A3A-A447-19CB3CA76B08"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81443CAD-F47E-4FD1-8E0E-8D646C90E4E3"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_portal_server:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D133FB73-C7F6-481C-B050-C242C771ED21"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FA65D4A-00C8-47E2-AF9F-6B420017CD29"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_services:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "858F70F4-3128-477D-ACAA-73F0AFA23A2B"}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_services:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C05DB1-03DC-454B-85E5-715938F0E13E"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "343EEB54-C1B1-4D7B-8780-5B5A5F2F840C"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44BC7B7B-7191-431C-8CAE-83B3F0EFF03E"}, {"criteria": "cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80F8E09E-E7F7-4D86-B140-3933EDC54E1C"}, {"criteria": "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D006508-BFB0-4F21-A361-3DA644F51D8A"}, {"criteria": "cpe:2.3:a:microsoft:word:2010:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2A0758C-6499-407F-823A-6F28BE56805E"}, {"criteria": "cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D79B6572-E7DF-4CC2-B70B-9B31BE1B6A81"}], "operator": "OR"}]}], "sourceIdentifier": "secure@microsoft.com"}