Security Update for Live Meeting 2007 / Lync 2010 and 2013 / Skype for Business 2016 (June 2017)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote Windows host is affected by a
remote code execution vulnerability.

Description :

The Microsoft Live Meeting 2007, Lync 2010, Lync 2013, or Skype 2016
for Business application installed on the remote Windows host is
missing a security update. It is, therefore, affected remote code
execution vulnerability in Windows Uniscribe software due to improper
handling of objects in memory. An unauthenticated, remote attacker
can exploit this, by convincing a user to visit a specially crafted
website or to open a specially crafted document file, to execute
arbitrary code in the context of the current user.

See also :

https://support.microsoft.com/en-us/help/3203382
https://support.microsoft.com/en-us/help/3191939
http://www.nessus.org/u?19ae218b
http://www.nessus.org/u?230084fb
http://www.nessus.org/u?9297a074
http://www.nessus.org/u?37af777f
http://www.nessus.org/u?5c3c3e16

Solution :

Microsoft has released a set of patches for Lync 2010, Lync 2013, and
Skype for Business 2016.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 100768 ()

Bugtraq ID: 98920

CVE ID: CVE-2017-0283

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now