MS15-131: Security Update for Microsoft Office to Address Remote Code Execution (3116111)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple remote code execution
vulnerabilities.

Description :

The remote Windows host has a version of Microsoft Office, Word, Word
Viewer, Excel, Excel Viewer, or Microsoft Office Compatibility Pack
installed that is affected by multiple remote code execution
vulnerabilities :

- Multiple memory corruption issues exist due to improper
handling of objects in memory. A remote attacker can
exploit these issues by convincing a user to open a
specially crafted file in an affected version of Office,
resulting in the execution of arbitrary code in the
context of the current user. (CVE-2015-6040,
CVE-2015-6118, CVE-2015-6122, CVE-2015-6124,
CVE-2015-6177)

- A remote code execution vulnerability exists due to
improper parsing of email messages. A remote attacker
can exploit this vulnerability by convincing a user to
open or preview a specially crafted email message,
resulting in the execution of arbitrary code in the
context of the current user. (CVE-2015-6172)

See also :

https://technet.microsoft.com/library/security/ms15-131

Solution :

Microsoft has released a set of patches for Office 2007, 2010, 2013,
2013 RT, 2016, Word, Word Viewer, Excel, Excel Viewer, and Microsoft
Office Compatibility Pack.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 87260 ()

Bugtraq ID: 78543
78546
78547
78548
78549
78550

CVE ID: CVE-2015-6040
CVE-2015-6118
CVE-2015-6122
CVE-2015-6124
CVE-2015-6172
CVE-2015-6177

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now