This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The Microsoft Office component installed on the remote host is affected
by multiple remote code execution vulnerabilities.
The remote Windows host is running a version of Microsoft Office,
Microsoft Word, Office Compatibility Pack, or Microsoft Word Viewer that
is affected by the following remote code execution vulnerabilities :
- A remote code execution vulnerability exists due to the
way the XML parser used by Word resolves external
- Remote code execution vulnerabilities exist due to
memory corruption issues in the way that Microsoft
Office parses files.
(CVE-2013-3847, CVE-2013-3848, CVE-2013-3849,
CVE-2013-3850, CVE-2013-3851, CVE-2013-3852,
CVE-2013-3853, CVE-2013-3854, CVE-2013-3855,
CVE-2013-3856, CVE-2013-3857, CVE-2013-3858)
If an attacker can trick a user on the affected host into opening a
specially crafted file, it may be possible to leverage these issues to
read arbitrary files on the target system or execute arbitrary code,
subject to the user's privileges.
See also :
Microsoft has released a set of patches for Office 2003, 2007, 2010,
Office Compatibility Pack, and Microsoft Word Viewer.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 69832 ()
Bugtraq ID: 62162621656216862169621706217162216622176222062222622236222462226
CVE ID: CVE-2013-3160CVE-2013-3847CVE-2013-3848CVE-2013-3849CVE-2013-3850CVE-2013-3851CVE-2013-3852CVE-2013-3853CVE-2013-3854CVE-2013-3855CVE-2013-3856CVE-2013-3857CVE-2013-3858
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.