MS11-073: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2587634)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Microsoft
Office.

Description :

The remote Windows host is running a version of Microsoft Office that
is potentially affected by two vulnerabilities :

- The application insecurely restricts the path used for
loading external libraries when opening documents that
use the .doc, .xls, or .ppt Office binary format and
when the Office File Validation Add-in is not
installed. This could lead to arbitrary code execution.
(CVE-2011-1980)

- The application may use an uninitialized object pointer
when opening a Word document, which could lead to
arbitrary code execution. (CVE-2011-1982)

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms11-073

Solution :

Microsoft has released a set of patches for Office 2003, 2007, and
2010.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 56176 ()

Bugtraq ID: 49513
49519

CVE ID: CVE-2011-1980
CVE-2011-1982