MS12-029 / MS12-030: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2680352 / 2663830) (Mac OS X)

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Microsoft
Office.

Description :

The remote Mac OS X host is running a version of Microsoft Office that
is affected by the following vulnerabilities :

- A memory corruption vulnerability could be triggered
when parsing specially crafted RTF-formatted data.
(CVE-2012-0183)

- Several memory corruption vulnerabilities could be
triggered when reading a specially crafted Excel file.
(CVE-2012-0141 / CVE-2012-0142 / CVE-2012-0143 /
CVE-2012-0184)

- A record parsing mismatch exists when opening a
specially crafted Excel file. (CVE-2012-1847)

If a remote attacker can trick a user into opening a malicious file
using the affected install, these vulnerabilities could be leveraged
to execute arbitrary code subject to the user's privileges.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-12-157/
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0279.html
http://technet.microsoft.com/en-us/security/bulletin/ms12-029
http://technet.microsoft.com/en-us/security/bulletin/ms12-030

Solution :

Microsoft has released patches for Office for Mac 2011 and Office 2008
for Mac.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 59046 ()

Bugtraq ID: 53342
53344
53373
53374
53375
53379

CVE ID: CVE-2012-0141
CVE-2012-0142
CVE-2012-0143
CVE-2012-0183
CVE-2012-0184
CVE-2012-1847