Multiple vulnerabilities in Microsoft Office

Published: 2016-08-10 17:12:37
Severity High
Patch available YES
Number of vulnerabilities 5
CVE ID CVE-2016-3318
CVE-2016-3317
CVE-2016-3316
CVE-2016-3313
CVE-2016-3315
CVSSv3 7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.9 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
7.9 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-119
Exploitation vector Network
Public exploit Public exploit code for vulnerability #3 is available.
Public exploit code for vulnerability #4 is available.
Vulnerable software Microsoft Office
Microsoft Office for Mac
Microsoft Word
Microsoft Word for Mac
Microsoft OneNote
Vulnerable software versions Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2013 RT
Microsoft Office 2016
Microsoft Office for Mac 2011
Microsoft Office for Mac 2016
Microsoft Word 2007 Service Pack 3
Microsoft Word 2010 Service Pack 2
Microsoft Word Viewer

Show more

Microsoft Word for Mac 2011
Microsoft Word for Mac 2016
Microsoft OneNote 2007 Service Pack 3
Microsoft OneNote 2010 Service Pack 2
Microsoft OneNote 2013 Service Pack 1
Microsoft OneNote 2016
Microsoft OneNote 2013 RT Service Pack 1
Vendor URL Microsoft

Security Advisory

The discovered vulnerabilities allow a remote attacker to obtain potentially sensitive information and execute arbitrary code on vulnerable system.

1) Memory Corruption in Graphics Component

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when parsing objects in memory within Graphics Component. A remote attacker can create a specially crafted Office document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.

External links

https://technet.microsoft.com/en-us/library/security/ms16-099.aspx

2) Memory Corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted Word document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.

External links

https://technet.microsoft.com/en-us/library/security/ms16-099.aspx

3) Memory Corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted Word document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.

External links

https://technet.microsoft.com/en-us/library/security/ms16-099.aspx

4) Memory Corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted Office document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.

External links

https://technet.microsoft.com/en-us/library/security/ms16-099.aspx

5) Information Disclosure in Microsoft OneNote

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to out-of-bound read when handling objects in memory. A remote attacker can create a specially crafted OneNote file and convince a victim to open it.

Successful exploitation of this vulnerability my allow an attacker to obtain potentially sensitive information but requires knowledge of the specific location of OneNote objects in memory.

External links

https://technet.microsoft.com/en-us/library/security/ms16-099.aspx

Back to List