MS11-089 / MS11-094 / MS11-096 : Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2590602 / 2639142 / 2640241) (Mac OS X)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Microsoft
Office.

Description :

The remote Mac OS X host is running a version of Microsoft Office that
is affected by the following vulnerabilities :

- A use-after-free vulnerability could be triggered when
reading a specially crafted Word file. (CVE-2011-1983)

- A memory corruption vulnerability could be triggered
when reading a specially crafted Excel file.
(CVE-2011-3403)

- A memory corruption vulnerability could be triggered
when reading an invalid record in a specially crafted
PowerPoint file. (CVE-2011-3413)

If a remote attacker can trick a user into opening a malicious file
using the affected install, these vulnerabilities could be leveraged
to execute arbitrary code subject to the user's privileges.

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms11-089
http://technet.microsoft.com/en-us/security/bulletin/ms11-094
http://technet.microsoft.com/en-us/security/bulletin/ms11-096

Solution :

Microsoft has released a patch for Office for Mac 2011, Office 2008
for Mac, and Office 2004 for Mac.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 57286 ()

Bugtraq ID: 50954
50956
50964

CVE ID: CVE-2011-1983
CVE-2011-3403
CVE-2011-3413