Skip to main content

Microsoft Office Remote Code Execution Vulnerabilities

Last Update Date: 11 Nov 2015 16:48 Release Date: 11 Nov 2015 3271 Views

RISK: High Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products
  1. Multiple Microsoft Office Memory Corruption Vulnerabilities
    Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  2. Microsoft Office Elevation of Privilege Vulnerability
    An elevation of privilege vulnerability exists in Microsoft Office software when an attacker instantiates an affected Office application via a COM control. An attacker who successfully exploited the vulnerability could gain elevated privileges and break out of the Internet Explorer sandbox.
  3. Microsoft Outlook for Mac Spoofing Vulnerability
    A spoofing vulnerability exists when Microsoft Outlook for Mac does not sanitize HTML or treat it in a safe manner. An attacker who successfully exploited this vulnerability could trick a user by redirecting them to a malicious website. The malicious website could spoof content or be used as a pivot to chain an attack with other vulnerabilities in web services.

Impact

  • Elevation of Privilege
  • Remote Code Execution

System / Technologies affected

  • Microsoft Office 2007
  • Microsoft Office 2010
  • Microsoft Office 2013
  • Microsoft Office 2013 RT
  • Microsoft Office 2016
  • Microsoft Office for Mac 2011
  • Microsoft Office for Mac 2016
  • Microsoft SharePoint Server 2007
  • Microsoft SharePoint Server 2010
  • Microsoft SharePoint Server 2013
  • Microsoft Office Web Apps 2010
  • Microsoft Office Web Apps 2013
  • Skype for Business 2016
  • Microsoft Lync 2013 (Skype for Business)

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link