CVE-2015-2503 (CNNVD-201511-187)

CRITICAL
中文标题:
Microsoft Office 特权提升漏洞
英文标题:
Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3,...
CVSS分数: 9.3
发布时间: 2015-11-11 11:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Microsoft Office是美国微软(Microsoft)公司开发的一款办公软件套件产品。常用组件有Word、Excel、Access、Powerpoint、FrontPage等。 Microsoft Office中存在特权提升漏洞。远程攻击者可通过COM控件实例化受影响的Office应用程序利用该漏洞获得特权提升并跳出Internet Explorer沙盒。以下产品及版本受到影响:Microsoft Access 2007 SP3,Excel 2007 SP3,InfoPath 2007 SP3,OneNote 2007 SP3,PowerPoint 2007 SP3,Project 2007 SP3,Publisher 2007 SP3,Visio 2007 SP3,Word 2007 SP3,Office 2007 IME (Japanese) SP3,Access 2010 SP2,Excel 2010 SP2,InfoPath 2010 SP2,OneNote 2010 SP2,PowerPoint 2010 SP2,Project 2010 SP2,Publisher 2010 SP2,Visio 2010 SP2,Word 2010 SP2,Pinyin IME 2010,Access 2013 SP1,Excel 2013 SP1,InfoPath 2013 SP1,OneNote 2013 SP1,PowerPoint 2013 SP1,Project 2013 SP1, Publisher 2013 SP1,Visio 2013 SP1,Word 2013 SP1,Excel 2013 RT SP1,OneNote 2013 RT SP1,PowerPoint 2013 RT SP1,Word 2013 RT SP1,Access 2016,Excel 2016,OneNote 2016,PowerPoint 2016,Project 2016,Publisher 2016,Visio 2016,Word 2016,Skype for Business 2016,Lync 2013 SP1。

英文描述:

Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Microsoft Office Elevation of Privilege Vulnerability."

CWE类型:
CWE-264
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
microsoft access 2007 - - cpe:2.3:a:microsoft:access:2007:sp3:*:*:*:*:*:*
microsoft access 2010 - - cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:*:*
microsoft access 2013 - - cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*
microsoft access 2016 - - cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*
microsoft excel 2007 - - cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*
microsoft excel 2010 - - cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*
microsoft excel 2013 - - cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*
microsoft excel 2016 - - cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*
microsoft infopath 2007 - - cpe:2.3:a:microsoft:infopath:2007:sp3:*:*:*:*:*:*
microsoft infopath 2010 - - cpe:2.3:a:microsoft:infopath:2010:sp2:*:*:*:*:*:*
microsoft infopath 2013 - - cpe:2.3:a:microsoft:infopath:2013:sp1:*:*:*:*:*:*
microsoft lync 2013 - - cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*
microsoft office_2007_ime sp3 - - cpe:2.3:a:microsoft:office_2007_ime:sp3:*:*:ja:*:*:*:*
microsoft onenote 2007 - - cpe:2.3:a:microsoft:onenote:2007:sp3:*:*:*:*:*:*
microsoft onenote 2010 - - cpe:2.3:a:microsoft:onenote:2010:sp2:*:*:*:*:*:*
microsoft onenote 2013 - - cpe:2.3:a:microsoft:onenote:2013:sp1:*:*:*:*:*:*
microsoft onenote 2016 - - cpe:2.3:a:microsoft:onenote:2016:*:*:*:*:*:*:*
microsoft pinyin_ime 2010 - - cpe:2.3:a:microsoft:pinyin_ime:2010:*:*:*:*:*:*:*
microsoft powerpoint 2007 - - cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*
microsoft powerpoint 2010 - - cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*
microsoft powerpoint 2013 - - cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*
microsoft powerpoint 2016 - - cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*
microsoft project 2007 - - cpe:2.3:a:microsoft:project:2007:sp3:*:*:*:*:*:*
microsoft project 2016 - - cpe:2.3:a:microsoft:project:2016:*:*:*:*:*:*:*
microsoft project_server 2010 - - cpe:2.3:a:microsoft:project_server:2010:sp2:*:*:*:*:*:*
microsoft project_server 2013 - - cpe:2.3:a:microsoft:project_server:2013:sp1:*:*:*:*:*:*
microsoft publisher 2007 - - cpe:2.3:a:microsoft:publisher:2007:sp3:*:*:*:*:*:*
microsoft publisher 2010 - - cpe:2.3:a:microsoft:publisher:2010:sp2:*:*:*:*:*:*
microsoft publisher 2013 - - cpe:2.3:a:microsoft:publisher:2013:sp1:*:*:*:*:*:*
microsoft publisher 2016 - - cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:*:*
microsoft skype_for_business 2016 - - cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*
microsoft visio 2007 - - cpe:2.3:a:microsoft:visio:2007:sp3:*:*:*:*:*:*
microsoft visio 2010 - - cpe:2.3:a:microsoft:visio:2010:sp2:*:*:*:*:*:*
microsoft visio 2013 - - cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*
microsoft visio 2016 - - cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*
microsoft word 2007 - - cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*
microsoft word 2010 - - cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*
microsoft word 2013 - - cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*
microsoft word 2016 - - cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1034117 vdb-entry
cve.org
访问
1034122 vdb-entry
cve.org
访问
MS15-116 vendor-advisory
cve.org
访问
1034119 vdb-entry
cve.org
访问
CVSS评分详情
9.3
CRITICAL
CVSS向量: AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2015-11-11 11:00:00
修改时间:
2024-08-06 05:17:27
创建时间:
2025-11-11 15:34:01
更新时间:
2025-11-11 15:52:16
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2015-2503 2025-11-11 15:18:55 2025-11-11 07:34:01
NVD nvd_CVE-2015-2503 2025-11-11 14:54:52 2025-11-11 07:42:43
CNNVD cnnvd_CNNVD-201511-187 2025-11-11 15:09:37 2025-11-11 07:52:16
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:52:16
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201511-187; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201511-187
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:43
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 39; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 39
  • data_sources: ['cve'] -> ['cve', 'nvd']