9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
High
0.7 High
EPSS
Percentile
98.0%
An improper memory objects handling and XLA files handling were found in Microsoft Office. By exploiting these vulnerabilities malicious users can execute arbitrary code. These vulnerabilities can be exploited remotely via a specially designed files.
Technical details
To mitigate some of these vulnerabilities you can block RTF files from opening. More information about this workaround you can find at MS16-088 advisory listed below.
CVE-2016-3278 critical
CVE-2016-3279 warning
CVE-2016-3280 critical
CVE-2016-3281 critical
CVE-2016-3282 critical
CVE-2016-3283 critical
CVE-2016-3284 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
support.microsoft.com/kb/3115114
support.microsoft.com/kb/3115118
support.microsoft.com/kb/3115246
support.microsoft.com/kb/3115254
support.microsoft.com/kb/3115259
support.microsoft.com/kb/3115262
support.microsoft.com/kb/3115272
support.microsoft.com/kb/3115279
support.microsoft.com/kb/3115285
support.microsoft.com/kb/3115289
support.microsoft.com/kb/3115292
support.microsoft.com/kb/3115299
support.microsoft.com/kb/3115301
support.microsoft.com/kb/3115306
support.microsoft.com/kb/3115308
support.microsoft.com/kb/3115309
support.microsoft.com/kb/3115311
support.microsoft.com/kb/3115312
support.microsoft.com/kb/3115315
support.microsoft.com/kb/3115317
support.microsoft.com/kb/3115318
support.microsoft.com/kb/3115322
support.microsoft.com/kb/3115386
support.microsoft.com/kb/3115393
support.microsoft.com/kb/3115395
support.microsoft.com/kb/3170460
support.microsoft.com/kb/3170463
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3278
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3279
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3280
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3281
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3282
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3283
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3284
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Sharepoint-Server/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
High
0.7 High
EPSS
Percentile
98.0%