MS15-033: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3048019)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple remote code execution
vulnerabilities.

Description :

The remote Windows host has a version of Microsoft Office, Office
Compatibility Pack, Microsoft Word, Microsoft Word Viewer, SharePoint
Server, or Microsoft Office Web Apps installed that is affected by
multiple remote code execution vulnerabilities :

- A remote code execution vulnerability exists due to
improper handling rich text format files in memory. A
remote attacker can exploit this vulnerability by
convincing a user to open a specially crafted file using
the affected software, resulting in execution of
arbitrary code in the context of the current user.
(CVE-2015-1641)

- Multiple use-after-free errors exist due to improper
parsing specially crafted Office files. A remote
attacker can exploit these errors by convincing a user
to open a specially crafted file using the affected
software, resulting in execution of arbitrary code in
the context of the current user. (CVE-2015-1649,
CVE-2015-1650, CVE-2015-1651)

See also :

https://technet.microsoft.com/library/security/ms15-033

Solution :

Microsoft has released a set of patches for Office 2010, Word 2007,
2010, 2013, Office Compatibility Pack, Microsoft Word Viewer,
SharePoint Server, and Office Web Apps.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:H/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 82769 ()

Bugtraq ID: 73991
74007
74011
74012

CVE ID: CVE-2015-1641
CVE-2015-1649
CVE-2015-1650
CVE-2015-1651

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now