Security Update for Microsoft Office (June 2017) (macOS)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote macOS or Mac OS X host is
affected by multiple remote code execution vulnerabilities.

Description :

The Microsoft Office application installed on the remote macOS or Mac
OS X host is missing a security update. It is, therefore, affected by
multiple remote code execution vulnerabilities in Microsoft Office due
to improper handling of objects in memory. An unauthenticated, remote
attacker can exploit these vulnerabilities, by convincing a user to
open a specially crafted Office document, to execute arbitrary code in
the context of the current user.

See also :

http://www.nessus.org/u?8fbc6de6
http://www.nessus.org/u?68489292
http://www.nessus.org/u?069ce460
http://www.nessus.org/u?b685de7b

Solution :

Microsoft has released patches for Microsoft Office for Mac 2011 and
Microsoft Office 2016 for Mac.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 100758 ()

Bugtraq ID: 98812
98815

CVE ID: CVE-2017-8509
CVE-2017-8511

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now