Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-0561 CVE-2019-0585 |
CWE-ID | CWE-200 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Microsoft Office for Mac Client/Desktop applications / Office applications Microsoft Office Client/Desktop applications / Office applications Microsoft Word Client/Desktop applications / Office applications Word Automation Services on Microsoft SharePoint Server Server applications / Other server solutions Office Online Server Server applications / Other server solutions Microsoft Office Web Apps Server Server applications / Application servers Microsoft SharePoint Server Server applications / Application servers |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU16882
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-0561
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper usage of Microsoft Word macro buttons. A remote attacker can create a specially crafted Microsoft Word file, trick the victim into opening it and read contents of arbitrary file on the system.
Successful exploitation of the vulnerability requires knowledge of the exact location of the file.
Install updates from vendor's website.
Vulnerable software versionsMicrosoft Office for Mac: 2016
Microsoft Office: 365 ProPlus - 2019 for Mac
Microsoft Word: 2010 - 2019
Word Automation Services on Microsoft SharePoint Server: 2010 Service Pack 2
Microsoft Office Web Apps Server: 2010 Service Pack 2
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0561
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website or open a file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16881
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-0585
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing Microsoft Word files. A remote attacker can create a specially crafted Word document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Office for Mac: 2016
Microsoft Office: 365 ProPlus - 2019 for Mac
Microsoft Word: 2010 - Viewer
Microsoft SharePoint Server: 2013 - 2019
Word Automation Services on Microsoft SharePoint Server: 2010 Service Pack 2
Office Online Server : 2016
Microsoft Office Web Apps Server: 2010 Service Pack 2
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0585
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website or open a file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.