MS15-033: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3048019)

medium Nessus Plugin ID 82768

Synopsis

An application installed on the remote Mac OS X host is affected by a cross-site scripting vulnerability.

Description

The remote Mac OS X host has a version of Microsoft Outlook for Mac for Office 365 installed that is affected by a cross-site scripting vulnerability due to improper sanitization of HTML strings.
A remote attacker can exploit this issue by convincing a user to open a file or visit a website containing specially crafted content, resulting in execution of arbitrary code in the context of the current user.

Solution

Microsoft has released a patch for Outlook for Mac for Office 365.

See Also

https://technet.microsoft.com/library/security/ms15-033

Plugin Details

Severity: Medium

ID: 82768

File Name: macosx_ms15-033_outlook_for_office365.nasl

Version: 1.14

Type: local

Agent: macosx

Published: 4/14/2015

Updated: 11/27/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: x-cpe:/a:microsoft:outlook_for_mac_for_office_365, cpe:/a:microsoft:office:2011:mac

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2015

Vulnerability Publication Date: 4/14/2015

Reference Information

CVE: CVE-2015-1639

BID: 73991

IAVA: 2015-A-0090-S

MSFT: MS15-033

MSKB: 3055707