Security Updates for Microsoft Office Products (September 2017)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The Microsoft Office Products are affected by multiple vulnerabilities.

Description :

The Microsoft Office Products are missing security updates.
It is, therefore, affected by multiple vulnerabilities :

- A remote code execution vulnerability exists in
Microsoft Office software when it fails to properly
handle objects in memory. An attacker who successfully
exploited the vulnerability could use a specially
crafted file to perform actions in the security context
of the current user. For example, the file could then
take actions on behalf of the logged-on user with the
same permissions as the current user. Exploitation of
this vulnerability requires that a user open a specially
crafted file with an affected version of Microsoft
Office software. In an email attack scenario, an
attacker could exploit the vulnerability by sending the
specially crafted file to the user and convincing the
user to open the file. In a web-based attack scenario,
an attacker could host a website (or leverage a
compromised website that accepts or hosts user-provided
content) that contains a specially crafted file that is
designed to exploit the vulnerability. However, an
attacker would have no way to force the user to visit
the website. Instead, an attacker would have to convince
the user to click a link, typically by way of an
enticement in an email or Instant Messenger message, and
then convince the user to open the specially crafted
file. The security update addresses the vulnerability by
correcting how Microsoft Office handles files in memory.
(CVE-2017-8630, CVE-2017-8744)

- A remote code execution vulnerability exists when the
Windows font library improperly handles specially
crafted embedded fonts. An attacker who successfully
exploited this vulnerability could take control of the
affected system. An attacker could then install
programs; view, change, or delete data; or create new
accounts with full user rights. Users whose accounts are
configured to have fewer user rights on the system could
be less impacted than users who operate with
administrative user rights. There are multiple ways an
attacker could exploit this vulnerability. In a web-
based attack scenario, an attacker could host a
specially crafted website that is designed to exploit
this vulnerability and then convince a user to view the
website. An attacker would have no way to force users to
view the attacker-controlled content. Instead, an
attacker would have to convince users to take action,
typically by getting them to click a link in an email
message or in an Instant Messenger message that takes
users to the attacker's website, or by opening an
attachment sent through email. In a file sharing attack
scenario, an attacker could provide a specially crafted
document file that is designed to exploit this
vulnerability, and then convince a user to open the
document file. The security update addresses the
vulnerabilities by correcting how the Windows font
library handles embedded fonts. (CVE-2017-8682)

- An information disclosure vulnerability exists when
Windows Uniscribe improperly discloses the contents of
its memory. An attacker who successfully exploited the
vulnerability could obtain information to further
compromise the users system. There are multiple ways an
attacker could exploit the vulnerability, such as by
convincing a user to open a specially crafted document
or by convincing a user to visit an untrusted webpage.
The update addresses the vulnerability by correcting how
Windows Uniscribe handles objects in memory.
(CVE-2017-8695)

- A remote code execution vulnerability exists due to the
way Windows Uniscribe handles objects in memory. An
attacker who successfully exploited this vulnerability
could take control of the affected system. An attacker
could then install programs; view, change, or delete
data; or create new accounts with full user rights.
Users whose accounts are configured to have fewer user
rights on the system could be less impacted than users
who operate with administrative user rights. There are
multiple ways an attacker could exploit this
vulnerability: In a web-based attack scenario, an
attacker could host a specially crafted website designed
to exploit this vulnerability and then convince a user
to view the website. An attacker would have no way to
force users to view the attacker-controlled content.
Instead, an attacker would have to convince users to
take action, typically by getting them to click a link
in an email or instant message that takes users to the
attacker's website, or by opening an attachment sent
through email. In a file-sharing attack scenario, an
attacker could provide a specially crafted document file
designed to exploit this vulnerability and then convince
a user to open the document file.The security update
addresses the vulnerability by correcting how Windows
Uniscribe handles objects in memory. (CVE-2017-8696)

- A remote code execution vulnerability exists in
Microsoft Office software when the software fails to
properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run
arbitrary code in the context of the current user. If
the current user is logged on with administrative user
rights, an attacker could take control of the affected
system. An attacker could then install programs; view,
change, or delete data; or create new accounts with full
user rights. Users whose accounts are configured to have
fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
Exploitation of the vulnerability requires that a user
open a specially crafted file with an affected version
of Microsoft Office software. In an email attack
scenario, an attacker could exploit the vulnerability by
sending the specially crafted file to the user and
convincing the user to open the file. In a web-based
attack scenario, an attacker could host a website (or
leverage a compromised website that accepts or hosts
user-provided content) that contains a specially crafted
file designed to exploit the vulnerability. An attacker
would have no way to force users to visit the website.
Instead, an attacker would have to convince users to
click a link, typically by way of an enticement in an
email or instant message, and then convince them to open
the specially crafted file. Note that the Preview Pane
is not an attack vector for this vulnerability. The
security update addresses the vulnerability by
correcting how Office handles objects in memory.
(CVE-2017-8742)

- An information disclosure vulnerability exists in the
way that the Windows Graphics Device Interface (GDI)
handles objects in memory, allowing an attacker to
retrieve information from a targeted system. By itself,
the information disclosure does not allow arbitrary code
execution; however, it could allow arbitrary code to be
run if the attacker uses it in combination with another
vulnerability. To exploit this vulnerability, an
attacker would have to log on to an affected system and
run a specially crafted application. Note that where the
severity is indicated as Critical in the Affected
Products table, the Preview Pane is an attack vector for
this vulnerability. The security update addresses the
vulnerability by correcting how GDI handles memory
addresses. (CVE-2017-8676)

See also :

http://www.nessus.org/u?8d24309b
http://www.nessus.org/u?c95ea355
http://www.nessus.org/u?69c44d41
http://www.nessus.org/u?40a27f00
http://www.nessus.org/u?a714c54e
http://www.nessus.org/u?b84ca703
http://www.nessus.org/u?607de17a
http://www.nessus.org/u?f846aeb6
http://www.nessus.org/u?7601f27e
http://www.nessus.org/u?4928d07a
http://www.nessus.org/u?fa6bb9d8
http://www.nessus.org/u?7d1e5263
http://www.nessus.org/u?b27cd572
http://www.nessus.org/u?7194ec3f
http://www.nessus.org/u?9ecdeba5
http://www.nessus.org/u?b2751aff

Solution :

Microsoft has released security updates for Microsoft Office Products.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.6
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 103133 ()

Bugtraq ID: 100732
100741
100748
100755
100772
100773
100780

CVE ID: CVE-2017-8630
CVE-2017-8676
CVE-2017-8682
CVE-2017-8695
CVE-2017-8696
CVE-2017-8742
CVE-2017-8744

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now