SB2017031422 - Multiple vulnerabilities in Microsoft Office 



SB2017031422 - Multiple vulnerabilities in Microsoft Office

Published: March 14, 2017 Updated: March 14, 2017

Security Bulletin ID SB2017031422
Severity
High
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 70% Low 30%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Memory corruption (CVE-ID: CVE-2017-0006)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Memory corruption (CVE-ID: CVE-2017-0019)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Memory corruption (CVE-ID: CVE-2017-0020)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Information disclosure (CVE-ID: CVE-2017-0027)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to improper disclosing of the contents of memory when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger boundary error and gain access to important data.

Successful exploitation of this vulnerability may result in information disclosure.


5) Memory corruption (CVE-ID: CVE-2017-0029)

The vulnerability allows a remote attacker to cause DoS conditions on the target system.

The weakness exists due improper handling of malicious Word files in memory. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and cause the target application to crash.

Successful exploitation of the vulnerability results in denial of service on the vulnerable system.

6) Memory corruption (CVE-ID: CVE-2017-0030)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Memory corruption (CVE-ID: CVE-2017-0031)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Memory corruption (CVE-ID: CVE-2017-0052)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Memory corruption (CVE-ID: CVE-2017-0053)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Out-of-bounds Read (CVE-ID: CVE-2017-0105)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to out-of-bounds memory read when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and gain access to important data.

Successful exploitation of this vulnerability may result in information disclosure on the vulnerable system.


Remediation

Install update from vendor's website.