Skip to main content

Microsoft Office Remote Code Execution Vulnerabilities

Last Update Date: 10 Jun 2015 09:50 Release Date: 10 Jun 2015 3637 Views

RISK: High Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products
  1. Microsoft Office Uninitialized Memory Use Vulnerability
    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then, for example, take actions on behalf of the logged-on user with the same permissions as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  2. Multiple Microsoft Office Memory Corruption Vulnerabilities
    Remote code execution vulnerabilities exist in Microsoft Office software that is caused when the Office software improperly handles objects in memory while parsing specially crafted Office files. This could corrupt system memory in such a way as to allow an attacker to execute arbitrary code.

 


Impact

  • Remote Code Execution

System / Technologies affected

  • Microsoft Office 2007
  • Microsoft Office 2010
  • Microsoft Office 2013
  • Microsoft Office 2013 RT

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link