Multiple vulnerabilities in Microsoft Office

Published: 2018-09-13 18:48:27
Severity High
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2018-8429
CVE-2018-8331
CVE-2018-8430
CVSSv3 3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-125
CWE-119
Exploitation vector Network
Public exploit Not available
Vulnerable software Microsoft Office for Mac
Microsoft Excel
Microsoft Office Compatibility Pack
Microsoft Office
Microsoft Excel for Mac
Microsoft Word
Vulnerable software versions Microsoft Office for Mac 2016
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer 2007 Service Pack 3
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Office 2016
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2013 RT
Microsoft Excel for Mac 2016
Microsoft Word 2013 Service Pack 1
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2016
Vendor URL Microsoft

Security Advisory

1) Buffer over-read

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing Excel files. A remote attacker can create a specially specially crafted Excel file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Remediation

Install update from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8429

2) Buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing Microsoft Excel files. A remote attacker can create a specially specially crafted Excel document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install update from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8331

3) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files within Microsoft Word. A remote attacker can create a specially crafted PDF document, trick the victim into opening it with vulnerable version of Microsoft Word, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8430

Back to List