SB2017031422 - Multiple vulnerabilities in Microsoft Office
Published: March 14, 2017 Updated: March 14, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-0006)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Memory corruption (CVE-ID: CVE-2017-0019)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Memory corruption (CVE-ID: CVE-2017-0020)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Information disclosure (CVE-ID: CVE-2017-0027)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to improper disclosing of the contents of memory when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger boundary error and gain access to important data.
Successful exploitation of this vulnerability may result in information disclosure.
5) Memory corruption (CVE-ID: CVE-2017-0029)
The vulnerability allows a remote attacker to cause DoS conditions on the target system.The weakness exists due improper handling of malicious Word files in memory. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and cause the target application to crash.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
6) Memory corruption (CVE-ID: CVE-2017-0030)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Memory corruption (CVE-ID: CVE-2017-0031)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
8) Memory corruption (CVE-ID: CVE-2017-0052)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Excel files. A remote attacker can create a specially crafted .xls file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Memory corruption (CVE-ID: CVE-2017-0053)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
10) Out-of-bounds Read (CVE-ID: CVE-2017-0105)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to out-of-bounds memory read when handling malicious Word files. A remote attacker can create a specially crafted .doc file, trick the victim into opening it, trigger memory corruption and gain access to important data.
Successful exploitation of this vulnerability may result in information disclosure on the vulnerable system.
Remediation
Install update from vendor's website.