Lucene search

K
symantecSymantec Security ResponseSMNTC-67283
HistoryMay 13, 2014 - 12:00 a.m.

Microsoft SharePoint CVE-2014-0251 Multiple Remote Code Execution Vulnerabilities

2014-05-1300:00:00
Symantec Security Response
www.symantec.com
60

EPSS

0.02

Percentile

89.0%

Description

Microsoft SharePoint is prone to multiple remote code-execution vulnerabilities. An attacker can leverage these issues to execute arbitrary code in the context of the W3WP service account user.

Technologies Affected

  • Microsoft Office Web Apps 2010 SP1
  • Microsoft Office Web Apps 2010 SP2
  • Microsoft Office Web Apps 2013
  • Microsoft SharePoint Designer 2007 Service Pack 3
  • Microsoft SharePoint Designer 2010 Service Pack 1 (32-bit versions)
  • Microsoft SharePoint Designer 2010 Service Pack 1 (64-bit versions)
  • Microsoft SharePoint Designer 2010 Service Pack 2 (32-bit versions)
  • Microsoft SharePoint Designer 2010 Service Pack 2 (64-bit versions)
  • Microsoft SharePoint Designer 2013 (32-bit versions)
  • Microsoft SharePoint Designer 2013 (64-bit versions)
  • Microsoft SharePoint Designer 2013 Service Pack 1 (32-bit versions)
  • Microsoft SharePoint Designer 2013 Service Pack 1 (64-bit versions)
  • Microsoft SharePoint Server 2007
  • Microsoft SharePoint Server 2010 SP1
  • Microsoft SharePoint Server 2010 SP2
  • Microsoft SharePoint Server 2013
  • Microsoft SharePoint Server 2013 SP1

Recommendations

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of suspicious or anomalous activity. This may help detect malicious actions that an attacker may take after successfully exploiting vulnerabilities in applications. Review all applicable logs regularly.

Updates are available. Please see the references or vendor advisory for more information.