SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Microsoft Office Vendors:   Microsoft
Microsoft Office Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information and Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1036559
SecurityTracker URL:  http://securitytracker.com/id/1036559
CVE Reference:   CVE-2016-3313, CVE-2016-3315, CVE-2016-3316, CVE-2016-3317, CVE-2016-3318   (Links to External Site)
Updated:  Aug 23 2016
Original Entry Date:  Aug 9 2016
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2007 SP3, 2010 SP2, 2013 SP1, 2013 RT SP1, 2016; Office for Mac 2011; Office 2016 for Mac; Word Viewer
Description:   Multiple vulnerabilities were reported in Microsoft Office. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system.

A remote user can create a specially crafted OneNote file that, when loaded by the target user, will access OneNote objects in memory and obtain potentially sensitive information on the target system [CVE-2016-3315].

A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2016-3313, CVE-2016-3316, CVE-2016-3317, CVE-2016-3318].

Arun Kumar Sharma (via Trend Micro's Zero Day Initiative (ZDI)), Dhanesh Kizhakkinan of FireEye Inc, Francis Provencher of COSIG, Jaanus Kaap, Sebastien Morin of COSIG, Udi Yavo of enSilo Inc, and dannywei of Tencent's Xuanwu Lab reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor advisory.

[Editor's note: On August 22, 2016, the vendor updated their advisory to announce that the 4.6.7 update for Microsoft Office for Mac 2011 (3179162) and the 15.25 update for Microsoft Office 2016 for Mac (3179163) are now available.]

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-099

Vendor URL:  technet.microsoft.com/library/security/ms16-099 (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC