This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
Arbitrary code can be executed on the remote host through Microsoft
The remote Windows host is running a version of Microsoft Office that
is potentially affected by two vulnerabilities :
- The application insecurely restricts the path used for
loading external libraries when opening documents that
use the .doc, .xls, or .ppt Office binary format and
when the Office File Validation Add-in is not
installed. This could lead to arbitrary code execution.
- The application may use an uninitialized object pointer
when opening a Word document, which could lead to
arbitrary code execution. (CVE-2011-1982)
See also :
Microsoft has released a set of patches for Office 2003, 2007, and
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 56176 ()
Bugtraq ID: 4951349519
CVE ID: CVE-2011-1980CVE-2011-1982
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.