Skip to main content

Microsoft Office Remote Code Execution Vulnerabilities

Last Update Date: 14 Aug 2015 Release Date: 12 Aug 2015 3228 Views

RISK: High Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products
  1. Multiple Microsoft Office Memory Corruption Vulnerabilities
    Remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then, for example, take actions on behalf of the logged-on user with the same permissions as the current user. Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office software.
  2. Unsafe Command Line Parameter Passing Vulnerability
    An information disclosure vulnerability exists in Microsoft Windows, Internet Explorer, and Microsoft Office when files at a medium integrity level become accessible to Internet Explorer running in Enhanced Protection Mode (EPM).
  3. Microsoft Office Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly validate templates. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. Exploitation of this vulnerability requires that a user open a specially crafted template file with an affected version of Microsoft Office software.
  4. Microsoft Office Integer Underflow Vulnerability
    A remote code execution vulnerability exists when Office decreases an integer value beyond its intended minimum value. Exploitation of this vulnerability requires that a user open a specially crafted Office file with an affected version of Microsoft Office software.

Impact

  • Remote Code Execution

System / Technologies affected

  • Microsoft Office 2007
  • Microsoft Office 2010
  • Microsoft Office 2013
  • Microsoft Office 2013 RT
  • Microsoft Office for Mac 2011
  • Microsoft Office for Mac 2016
  • Microsoft SharePoint Server 2010
  • Microsoft SharePoint Server 2013
  • Microsoft Office Web Apps 2010
  • Microsoft Office Web Apps 2013

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link