CERT-In Vulnerability Note
CIVN-2015-0278
Multiple Vulnerabilities in Microsoft Office
Original Issue Date:November 12, 2015
Severity Rating: MEDIUM
Software Affected
- Microsoft Office 2007 Service Pack 3
- Microsoft Office 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft Office 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Office 2013 RT Service Pack 1
- Microsoft Office 2016 32-bit and 64-bit editions
- Microsoft Office Compatibility Pack Service Pack 3
- Microsoft OneNote 2013 RT Service Pack 1
- Microsoft Access 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft Access 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Access 2016 32-bit and 64-bit editions
- Microsoft Excel 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft Excel 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Excel 2013 RT Service Pack 1
- Microsoft Excel 2016 32-bit and 64-bit editions
- Microsoft Excel for Mac 2011 and Mac 2016
- Microsoft Excel Viewer
- Microsoft InfoPath 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft InfoPath 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft OneNote 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft OneNote 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft OneNote 2016 32-bit and 64-bit editions
- Microsoft PowerPoint 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft PowerPoint 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft PowerPoint 2013 RT Service Pack 1
- Microsoft PowerPoint 2016 32-bit and 64-bit editions
- Microsoft project 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft project 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Project 2016 32-bit and 64-bit editions
- Microsoft Publisher 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft Publisher 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Publisher 2016 32-bit and 64-bit editions
- Microsoft Visio 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft Visio 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Visio 2016 32-bit and 64-bit editions
- Microsoft Word 2010 Service Pack 2 32-bit and 64-bit editions
- Microsoft Word 2013 Service Pack 1 32-bit and 64-bit editions
- Microsoft Word 2013 RT Service Pack 1
- Microsoft Word 2016 32-bit and 64-bit editions
- Microsoft Word Viewer
Overview
Multiple vulnerabilities have been reported in Microsoft Office which could allow a remote attacker to spoof websites, bypass security controls and execute arbitrary code on the target system with the privileges of the currently logged-in user.
Description
1. Multiple Memory Corruption Vulnerabilities
(
CVE-2015-6038
CVE-2015-6091
CVE-2015-6092
CVE-2015-6093
CVE-2015-6094
)
Multiple Memory Corruption Vulnerabilities exist in Microsoft Office due to improper memory operations performed by the affected software. A remote attacker could exploit these vulnerabilities by accessing a target system and executing a target application which is designed to pass malicious input to the affected software. Successful exploitation of these vulnerabilities could allow an attacker to trigger memory corruption resulting in execution of arbitrary code in the context of currently logged-in user.
2. Privilege Escalation Vulnerability
(
CVE-2015-2503
)
This vulnerability exists due to improper instantiatiation of affected office applications by the Component Object Model (COM) controls which could be exploited by an attacker to gain elevated privileges and bypass the Internet Explorer Sandbox.
3. Mac HTML Spoofing Vulnerability
(
CVE-2015-6123
)
This vulnerability exists due to insufficient sanitization of the crafted HTML content by Microsoft Outlook for Mac. A remote attacker could successfully exploit this vulnerability by sending user an email to submit malicious input thereby redirecting the users to a malicious site. Successful exploitation of this vulnerability could lead to disclosure of sensitive information and conduct further attacks.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS15-116
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/ms15-116.aspx
References
Microsoft
https://technet.microsoft.com/en-us/library/security/ms15-116.aspx
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=41855
http://tools.cisco.com/security/center/viewAlert.x?alertId=41856
http://tools.cisco.com/security/center/viewAlert.x?alertId=41857
http://tools.cisco.com/security/center/viewAlert.x?alertId=41858
http://tools.cisco.com/security/center/viewAlert.x?alertId=41859
http://tools.cisco.com/security/center/viewAlert.x?alertId=41860
http://tools.cisco.com/security/center/viewAlert.x?alertId=42007
Securitytracker
http://securitytracker.com/id/1034122
CVE Name
CVE-2015-6094
CVE-2015-2503
CVE-2015-6123
CVE-2015-6038
CVE-2015-6091
CVE-2015-6092
CVE-2015-6093
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|