CVE-2006-0009
CVSS5.1
发布时间 :2006-03-14 18:02:00
修订时间 :2011-03-07 21:29:09
NMCOPS    

[原文]Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.


[CNNVD]Microsoft Office畸形传送名单远程代码执行漏洞(CNNVD-200603-256)

        Microsoft Office是非常流行的办公软件。
        Microsoft Office在处理Office文档时存在漏洞,成功利用此漏洞的攻击者可以完全控制受影响的系统。
        攻击者可以通过在Office文档内构建特制的传送名单来利用此漏洞,可能允许远程执行代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:works:2003Microsoft works_suite 2003
cpe:/a:microsoft:office:xp:sp3Microsoft Office XP Service Pack 3
cpe:/a:microsoft:works:2002Microsoft works_suite 2002
cpe:/a:microsoft:works:2005Microsoft Works 2005
cpe:/a:microsoft:works:2000Microsoft Works 2000
cpe:/a:microsoft:office:v.x::mac
cpe:/a:microsoft:office:2000:sp3Microsoft Office 2000 sp3
cpe:/a:microsoft:works:2004Microsoft Works 2004
cpe:/a:microsoft:works:2001Microsoft works_suite 2001
cpe:/a:microsoft:office:2003:sp2Microsoft Office 2003 sp2
cpe:/a:microsoft:office:2004::macMicrosoft Office 2004 Mac
cpe:/a:microsoft:works:2006Microsoft works_suite 2006
cpe:/a:microsoft:office:2003:sp1Microsoft Office 2003 sp1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:798Office XP Remote Code Execution via Malformed Routing Slip
oval:org.mitre.oval:def:1653Excel Viewer 2003 Remote Code Execution via Malformed Routing Slip
oval:org.mitre.oval:def:1504Excel 2003 Remote Code Execution via Malformed Routing Slip
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0009
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0009
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-256
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-073A.html
(VENDOR_ADVISORY)  CERT  TA06-073A
http://www.kb.cert.org/vuls/id/682820
(VENDOR_ADVISORY)  CERT-VN  VU#682820
http://www.securityfocus.com/bid/17000
(PATCH)  BID  17000
http://www.securityfocus.com/archive/1/archive/1/427671/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060314 SYMSA-2006-001: Buffer overflow in Microsoft Office 2000, Office XP (2002), and Office 2003 Routing Slip Metadata
http://www.microsoft.com/technet/security/bulletin/ms06-012.mspx
(PATCH)  MS  MS06-012
http://securitytracker.com/id?1015766
(PATCH)  SECTRACK  1015766
http://secunia.com/advisories/19138
(VENDOR_ADVISORY)  SECUNIA  19138
http://xforce.iss.net/xforce/xfdb/29009
(UNKNOWN)  XF  powerpoint-presentation-code-execution(29009)
http://xforce.iss.net/xforce/xfdb/25009
(UNKNOWN)  XF  office-routing-slip-bo(25009)
http://www.vupen.com/english/advisories/2006/3678
(UNKNOWN)  VUPEN  ADV-2006-3678
http://www.vupen.com/english/advisories/2006/0950
(UNKNOWN)  VUPEN  ADV-2006-0950
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ%5FMDROPPER%2EBH
(UNKNOWN)  MISC  http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ%5FMDROPPER%2EBH
http://www.symantec.com/security_response/writeup.jsp?docid=2006-091810-5028-99
(UNKNOWN)  MISC  http://www.symantec.com/security_response/writeup.jsp?docid=2006-091810-5028-99
http://www.symantec.com/enterprise/research/SYMSA-2006-001.txt
(UNKNOWN)  MISC  http://www.symantec.com/enterprise/research/SYMSA-2006-001.txt
http://www.securityfocus.com/bid/20059
(UNKNOWN)  BID  20059
http://www.securityfocus.com/archive/1/archive/1/446425/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060919 Microsoft PowerPoint 0-day Vulnerability FAQ - September written
http://www.securityfocus.com/archive/1/archive/1/446370/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060919 New PowerPoint 0-day Trojan in the wild
http://www.securityfocus.com/archive/1/archive/1/444051/100/200/threaded
(UNKNOWN)  BUGTRAQ  20060822 Major updates in PowerPoint FAQ document - not a 0-day issue
http://www.securityfocus.com/archive/1/archive/1/443890/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060819 New PowerPoint 0-day and Trojan - FAQ document ready
http://www.securityfocus.com/archive/1/archive/1/432004/30/5340/threaded
(UNKNOWN)  BUGTRAQ  20060422 PowerPoint Phishing Trojan
http://www.osvdb.org/23903
(UNKNOWN)  OSVDB  23903
http://www.darkreading.com/document.asp?doc_id=101970
(UNKNOWN)  MISC  http://www.darkreading.com/document.asp?doc_id=101970
http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm
http://securitytracker.com/id?1016886
(UNKNOWN)  SECTRACK  1016886
http://securitytracker.com/id?1016720
(UNKNOWN)  SECTRACK  1016720
http://secunia.com/advisories/19238
(UNKNOWN)  SECUNIA  19238
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049540.html
(UNKNOWN)  FULLDISC  20060919 New PowerPoint 0-day Trojan in the wild
http://isc.sans.org/diary.php?storyid=1618
(UNKNOWN)  MISC  http://isc.sans.org/diary.php?storyid=1618
http://blogs.securiteam.com/?p=559
(UNKNOWN)  MISC  http://blogs.securiteam.com/?p=559
http://blogs.securiteam.com/?p=557
(UNKNOWN)  MISC  http://blogs.securiteam.com/?p=557
http://blogs.securiteam.com/?author=28
(UNKNOWN)  MISC  http://blogs.securiteam.com/?author=28
http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0597.html
(UNKNOWN)  FULLDISC  20060822 Major updates in PowerPoint FAQ document - not a 0-day issue

- 漏洞信息

Microsoft Office畸形传送名单远程代码执行漏洞
中危 缓冲区溢出
2006-03-14 00:00:00 2007-08-27 00:00:00
远程  
        Microsoft Office是非常流行的办公软件。
        Microsoft Office在处理Office文档时存在漏洞,成功利用此漏洞的攻击者可以完全控制受影响的系统。
        攻击者可以通过在Office文档内构建特制的传送名单来利用此漏洞,可能允许远程执行代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-012.mspx#E4EAE

- 漏洞信息 (F44663)

Technical Cyber Security Alert 2006-73A (PacketStormID:F44663)
2006-03-15 00:00:00
CERT,US-CERT  us-cert.gov
advisory,remote,denial of service,arbitrary,vulnerability
CVE-2005-4131,CVE-2006-0009,CVE-2006-0028,CVE-2006-0029,CVE-2006-0030,CVE-2006-0031
[点击下载]

Technical Cyber Security Alert TA06-073A - Microsoft has released updates that address critical vulnerabilities in Microsoft Office and Excel. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



                        National Cyber Alert System

                Technical Cyber Security Alert TA06-073A


Microsoft Office and Excel Vulnerabilities

   Original release date: March 14, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Office for Windows and Mac OS X
     * Microsoft Excel for Windows and Mac OS X
     * Microsoft Works Suite for Windows

   For more complete information, refer to the Microsoft Security
   Bulletin Summary for March 2006.


Overview

   Microsoft has released updates that address critical vulnerabilities
   in Microsoft Office and Excel. Exploitation of these vulnerabilities
   could allow a remote, unauthenticated attacker to execute arbitrary
   code or cause a denial of service on a vulnerable system.


I. Description

   Microsoft Security Bulletin Summary for March 2006 addresses
   vulnerabilities in Microsoft Office and Excel. Further information is
   available in the following US-CERT Vulnerability Notes:

   VU#339878 - Microsoft Excel malformed parsing format file memory
   corruption vulnerability 

   Microsoft Excel contains a memory corruption vulnerability. This
   vulnerability may allow a remote attacker to execute arbitrary code on
   a vulnerable system.
   (CVE-2006-0028)

   VU#104302 - Microsoft Excel malformed record memory corruption
   vulnerability 

   Microsoft Excel fails to properly validate records. This vulnerability
   may allow a remote attacker to execute arbitrary code on a vulnerable
   system.
   (CVE-2006-0031)

   VU#123222 - Microsoft Excel malformed graphic memory corruption
   vulnerability 

   Microsoft Excel fails to properly validate graphics. This
   vulnerability may allow a remote attacker to execute arbitrary code on
   a vulnerable system.
   (CVE-2006-0030)

   VU#235774 - Microsoft Excel malformed description memory corruption
   vulnerability 

   Microsoft Excel fails to properly validate the description field. This
   vulnerability may allow a remote attacker to execute arbitrary code on
   a vulnerable system.
   (CVE-2006-0029)

   VU#642428 - Microsoft Excel fails to properly perform range validation
   when parsing document files 

   Microsoft Excel contains an error in range validation, which may allow
   a remote unauthenticated, attacker to execute arbitrary code on a
   vulnerable system.
   (CVE-2005-4131)

   VU#682820 - Microsoft Office routing slip buffer overflow 

   Microsoft Office contains a buffer overflow in the parsing of routing
   slips, which may allow an attacker to execute arbitrary code on a
   vulnerable system.
   (CVE-2006-0009)


II. Impact

   A remote, unauthenticated attacker could execute arbitrary code with
   the privileges of the user. If the user is logged on with
   administrative privileges, the attacker could take complete control of
   an affected system. An attacker may also be able to cause a denial of
   service.


III. Solution

Apply Updates

   Microsoft has provided the updates for these vulnerabilities in the
   Security Bulletins and on the Microsoft Update site.


Workarounds

   Please see the following US-CERT Vulnerability Notes for workarounds.


Appendix A. References

     * Microsoft Security Bulletin Summary for March 2006 -
       <http://www.microsoft.com/technet/security/bulletin/ms06-mar.mspx>

     * US-CERT Vulnerability Note VU#339878 -
       <http://www.kb.cert.org/vuls/id/339878>

     * US-CERT Vulnerability Note VU#104302 -
       <http://www.kb.cert.org/vuls/id/104302>

     * US-CERT Vulnerability Note VU#123222 -
       <http://www.kb.cert.org/vuls/id/123222>

     * US-CERT Vulnerability Note VU#235774 -
       <http://www.kb.cert.org/vuls/id/235774>

     * US-CERT Vulnerability Note VU#642428 -
       <http://www.kb.cert.org/vuls/id/642428>

     * US-CERT Vulnerability Note VU#682820 -
       <http://www.kb.cert.org/vuls/id/682820>

     * CVE-2005-4131 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4131>

     * CVE-2006-0009 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0009>

     * CVE-2006-0028 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0028>

     * CVE-2006-0029 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0029>

     * CVE-2006-0030 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0030>

     * CVE-2006-0031 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0031>

     * Microsoft Update - <https://update.microsoft.com/microsoftupdate>


 ____________________________________________________________________
 
   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-073A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA06-073A Feedback VU#339878" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   March 14, 2006: Initial release
  
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRBdHxH0pj593lg50AQKjmwgA09ePMKZtjsxkwWaWMSFxtqGZaeV1hHby
LBApam/YAuNpmLZKzwz36quzlbceDcSeBQKKbvgqhi/Cm4Sjsywczay0agHsdXiv
dzwQCAeE0+5JA2kidsdQV9u+X866hfDq63oXy3nef/x1RPOBvNSOb8FnG1yvMCwn
965R6SUbtrA/4HRcEmVH+8dciSnARh90rcIPN6EorC7mCdXykk2YDs0MX8nuT+fl
HeHn06kvTkmJbRNZ/xq7LyGIVeuQ7Xqv1fCiqywNdJUxHg1YPmBIPqfY3e6dcqE1
rS6ithE6u9GlDMTYbTLhL3+JGE4IiIRuZL10z37x+w07AHSFuTHfWQ==
=3xcR
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F44658)

SYMSA-2006-001.txt (PacketStormID:F44658)
2006-03-15 00:00:00
Ollie Whitehouse  symantec.com
advisory,overflow,arbitrary
CVE-2006-0009
[点击下载]

Symantec Security Advisory SYMSA-2006-001 - There exists a buffer overflow in Microsoft Word, Excel, PowerPoint, and Outlook in the parsing of the routing slip metadata. The result is that when a user closes a malicious document, arbitrary code can be executed on the host in question.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



                   Symantec Professional Services 
 
                         www.symantec.com
                        Security Advisory

Advisory ID  : SYMSA-2006-001 
Advisory Name: Buffer overflow in Microsoft Office 2000, Office XP 
               (2002), and Office 2003 Routing Slip Metadata.
Release Date : 03-14-2006 
Application  : Microsoft Word, Microsoft Excel, Microsoft PowerPoint,
               Microsoft Outlook 
Platform     : Windows 
Severity     : Remotely exploitable / User access 
Author       : Ollie Whitehouse / ollie_whitehouse@symantec.com 
Vendor Status: Duplicated and verified by Microsoft, patch available.
CVE Number   : CVE-2006-0009 
Reference    : http://www.securityfocus.com/bid/17000 


Overview: 

        There exists a buffer overflow in Microsoft Word, Excel, 
        PowerPoint, and Outlook in the parsing of the routing slip
        metadata. The result is that when a user closes a malicious 
        document, arbitrary code can be executed on the host in 
        question.


Details: 

        Microsoft Office supports the concept of routing slips. These 
        can be embedded within documents to ease the process of 
        collaborative working. During Symantec’s investigation it was 
        discovered that within the metadata of Microsoft’s document 
        format that there is both a length value and a null 
        terminated string for the different sections of a routing 
        slip. Upon further investigation it was discovered that the 
        affected applications allocate memory based on the size 
        contained within the length field, but then proceeds to copy 
        the entire string up until the null termination.

        The result in the case of Microsoft Word 2002 SP3 (fully 
        patched), is that we overwrite the saved return address on 
        the stack with a Unicode value. This can be used to obtain 
        control of the execution within the program.

        Microsoft Word, Excel, PowerPoint and Outlook all behave 
        slightly differently and in the case of Office 2003, it 
        appears that the values move from the stack to the heap 
        which makes exploitation more complicated, yet not impossible.


Vendor Response:

        The above vulnerability was addressed by Microsoft Security 
        Bulletin MS06-012. For details see 
        http://www.microsoft.com/technet/security/Bulletin/MS06-012.mspx
 
        If there are any further questions about this statement, 
        please contact Microsoft support.

Recommendation:
        Apply the patch supplied by Microsoft according to your 
        organization's software maintenance test and deployment 
        procedures.

Common Vulnerabilities and Exposures (CVE) Information:

        The Common Vulnerabilities and Exposures (CVE) project has 
        assigned the following names to these issues.  These are 
        candidates for inclusion in the CVE list 
        (http://cve.mitre.org), which standardizes names for 
        security problems.


        CVE-2006-0009


- -------Symantec Consulting Services Advisory Information-------

For questions about this advisory, or to report an error:
cs_advisories@symantec.com

For details on Symantec's Vulnerability Reporting Policy: 
http://www.symantec.com/research/Symantec-Responsible-Disclosure.pdf

Consulting Services Advisory Archive: 
http://www.symantec.com/research/

Consulting Services Advisory PGP Key:
http://www.symantec.com/research/Symantec_Consulting_Services_Advisori
es_PGP.asc

- -------------Symantec Product Advisory Information-------------

To Report a Security Vulnerability in a Symantec Product:
secure@symantec.com 

For general information on Symantec's Product Vulnerability 
reporting and response:
http://www.symantec.com/security/

Symantec Product Advisory Archive: 
http://www.symantec.com/avcenter/security/SymantecAdvisories.html

Symantec Product Advisory PGP Key:
http://www.symantec.com/security/Symantec-Vulnerability-Management-Key
.asc

- ---------------------------------------------------------------

Copyright (c) 2006 by Symantec Corp.
Permission to redistribute this alert electronically is granted 
as long as it is not edited in any way unless authorized by 
Symantec Consulting Services. Reprinting the whole or part of 
this alert in any medium other than electronically requires 
permission from cs_advisories@symantec.com.

Disclaimer
The information in the advisory is believed to be accurate at the 
time of publishing based on currently available information. Use 
of the information constitutes acceptance for use in an AS IS 
condition. There are no warranties with regard to this information. 
Neither the author nor the publisher accepts any liability for any 
direct, indirect, or consequential loss or damage arising from use 
of, or reliance on, this information.

Symantec, Symantec products, and Symantec Consulting Services are 
registered trademarks of Symantec Corp. and/or affiliated companies 
in the United States and other countries. All other registered and 
unregistered trademarks represented in this document are the sole 
property of their respective companies/owners.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRBcZsnvrrLpldMO6EQIMiQCg3Xc9RHOtk3zhThEvLanxhhvj2tIAoMuW
55u11JffbKu3mqOOlrcxhBO/
=elwo
-----END PGP SIGNATURE-----
    

- 漏洞信息

23903
Microsoft Office Crafted Routing Slip Arbitrary Code Execution
Remote / Network Access, Context Dependent Input Manipulation
Loss of Integrity Patch / RCS
Exploit Private, Virus / Malware Vendor Verified, Uncoordinated Disclosure, Discovered in the Wild

- 漏洞描述

A remote overflow exists in Microsoft Office 2000, Office XP (2002), and Office 2003. The Microsoft Word, Excel, PowerPoint, and Outlook applications fail to parse the routing slip metadata resulting in a buffer overflow. With a specially crafted document, an attacker can cause arbitrary code execution when a user closes a malicious document resulting in a loss of integrity.

- 时间线

2006-03-14 Unknow
Unknow 2006-03-14

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, the vendor has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft Office Routing Slip Processing Remote Buffer Overflow Vulnerability
Boundary Condition Error 17000
Yes No
2006-03-14 12:00:00 2006-08-24 10:44:00
Discovered by Ollie Whitehouse, Symantec.

- 受影响的程序版本

Microsoft Works Suite 2006 0
Microsoft Works Suite 2005 0
Microsoft Works Suite 2004
Microsoft Works Suite 2003
Microsoft Works Suite 2002
Microsoft Works Suite 2001
Microsoft Works Suite 2000 0
Microsoft Office XP SP3
+ Microsoft Excel 2002 SP3
+ Microsoft Excel 2002 SP3
+ Microsoft FrontPage 2002 SP3
+ Microsoft FrontPage 2002 SP3
+ Microsoft Outlook 2002 SP3
+ Microsoft Outlook 2002 SP3
+ Microsoft PowerPoint 2002 SP3
+ Microsoft PowerPoint 2002 SP3
+ Microsoft Publisher 2002 SP3
+ Microsoft Publisher 2002 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Office 2000 SP3
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Home
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Professional
Avaya Modular Messaging (MAS) 3.0

- 漏洞讨论

Microsoft Office is prone to a remote buffer-overflow vulnerability.

This vulnerability occurs when the application handles a specially crafted document. A successful attack can result in a remote compromise in the context of an affected user.

Update: This issue is known to be exploited in the wild by malware. In particular, 'Trojan.PPDropper' is known to exploit this issue.

- 漏洞利用

The 'Trojan.PPDropper' malware is known to exploit this issue.

- 解决方案


Microsoft has released fixes to address this vulnerability in supported versions of the affected software.

Avaya has released advisory ASA-2006-069 to identify vulnerable Avaya products. Avaya advises customers to apply patches released by Microsoft. Please see references for more information.


Microsoft Office XP SP3

Microsoft Works Suite 2003

Microsoft Office 2003 SP2

Microsoft Office 2003 SP1

Microsoft Works Suite 2002

Microsoft Works Suite 2000 0

Microsoft Works Suite 2006 0

Microsoft Works Suite 2005 0

Microsoft Office 2000 SP3

Microsoft Works Suite 2001

Microsoft Works Suite 2004

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站