Lucene search

K
kasperskyKaspersky LabKLA10696
HistoryNov 10, 2015 - 12:00 a.m.

KLA10696 Multiple vulnerabilities in Microsoft Office

2015-11-1000:00:00
Kaspersky Lab
threats.kaspersky.com
192

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.8

Confidence

High

EPSS

0.879

Percentile

98.7%

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Improper memory objects handling can be exploited remotely via a specially designed file or web content to execute arbitrary code;
  2. AN unknown vulnerability can be exploited via a specially designed web content to gain privileges or execute arbitrary code from vectors related to Internet Explorer;
  3. Lack of HTML sanitization at Outlook can be exploited remotely via a specially designed content to spoof user interface. (OS X)

Original advisories

CVE-2015-6091

CVE-2015-6092

CVE-2015-6093

CVE-2015-6094

CVE-2015-6038

CVE-2015-2503

CVE-2015-6123

Related products

Microsoft-Office

CVE list

CVE-2015-6091 critical

CVE-2015-6092 critical

CVE-2015-6093 critical

CVE-2015-6094 critical

CVE-2015-6038 critical

CVE-2015-2503 critical

CVE-2015-6123 warning

KB list

3085634

3101496

3101559

3101514

2899516

3101510

3101513

3101512

3085614

3085594

2687406

3101555

3101554

3101367

3101364

3101365

3101360

3102925

3054793

3102924

2889915

3101507

3085511

3085552

3085551

2910978

3085477

2920680

2920726

3101529

3101543

3101525

3101526

3101553

3101506

2880506

3101359

3101564

3101499

3104540

2965313

3101558

3101544

3101509

3054978

3101371

3101370

2920698

2878230

3085584

2596614

2596770

3085548

3101560

3085561

3101521

3101533

2899473

2817478

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Office 2007 Service Pack 3Microsoft Office 2010 Service Packย 2Microsoftย Pinyin IME 2010Microsoft Office 2013 Service Packย 1Microsoft Office 2013 RT Service Pack 1Microsoft Office 2016Microsoft Excel 2011 for MacMicrosoft Excel 2016 for MacMicrosoft Office Compatibility Pack Service Pack 3Microsoft Excel ViewerMicrosoft Word ViewerMicrosoft SharePoint Server 2007 Service Pack 3Microsoft SharePoint Server 2010 Service Pack 2Microsoft SharePoint Server 2013 Service Pack 1Microsoft Office Web Apps 2010 Service Pack 2Microsoft Office Web Apps Server 2013 Service Pack 1Skype for Business 2016Microsoft Lync 2013 Service Pack 1

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.8

Confidence

High

EPSS

0.879

Percentile

98.7%