Security Update for Microsoft Office Products (May 2017)

High Nessus Plugin ID 100103

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.4

Synopsis

An application installed on the remote Windows host is affected by multiple vulnerabilities.

Description

The Microsoft Office application, Office Web Apps, or SharePoint Server installed on the remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :

- A remote code execution vulnerability exists in Microsoft Office software due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted Office document, to execute arbitrary code in the context of the current user. (CVE-2017-0254)

- A cross-site scripting (XSS) vulnerability exists in Microsoft SharePoint Server due improper validation of user-supplied input in web requests. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session. (CVE-2017-0255)

- A remote code execution vulnerability exists in Microsoft Office due to improper handling of malformed graphics images. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted EPS file, to execute arbitrary code in the context of the current user. (CVE-2017-0261)

- A remote code execution vulnerability exists in Microsoft Office when handling malformed graphics images. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted EPS file or visit a specially crafted website, to execute arbitrary code. (CVE-2017-0262)

- A remote code execution vulnerability exists in Microsoft Office due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted file, to execute arbitrary code in the context of the current user. (CVE-2017-0281)

Solution

Microsoft has released a set of patches for Microsoft Office 2007, 2010, 2013, and 2016; Microsoft Word 2007, 2010, 2013, and 2016; Skype for Business 2016; Microsoft Word Viewer; Microsoft Office Compatibility Pack; SharePoint Server 2010; SharePoint Enterprise Server 2013 and 2016; SharePoint Foundation 2013; Word Automation Services on Microsoft SharePoint Server 2010 and 2013; Microsoft Office Project Server 2013; Microsoft Office Web Apps Server 2010 and 2013; and Office Online Server.

See Also

https://portal.msrc.microsoft.com/en-us/security-guidance/summary

Plugin Details

Severity: High

ID: 100103

File Name: smb_nt_ms17_may_office.nasl

Version: 1.16

Type: local

Agent: windows

Published: 2017/05/10

Updated: 2019/11/13

Dependencies: 68879, 27524, 13855, 57033, 93232, 74250, 84669

Risk Information

Risk Factor: High

VPR Score: 9.4

CVSS Score Source: CVE-2017-0281

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:word, cpe:/a:microsoft:word_viewer, cpe:/a:microsoft:office_compatibility_pack, cpe:/a:microsoft:office_web_apps, cpe:/a:microsoft:office_online_server, cpe:/a:microsoft:sharepoint_server, cpe:/a:microsoft:sharepoint_foundation, cpe:/a:microsoft:project, cpe:/a:microsoft:skype_for_business

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/05/09

Vulnerability Publication Date: 2017/05/09

Exploitable With

Core Impact

Reference Information

CVE: CVE-2017-0254, CVE-2017-0255, CVE-2017-0261, CVE-2017-0262, CVE-2017-0281

BID: 98101, 98104, 98107, 98279, 98297

MSKB: 2596904, 3114375, 3118310, 3162040, 3162054, 3162069, 3172458, 3172475, 3172482, 3172532, 3172536, 3178633, 3178638, 3178729, 3191835, 3191836, 3191839, 3191841, 3191843, 3191858, 3191863, 3191865, 3191880, 3191881, 3191885, 3191886, 3191887, 3191888, 3191890, 3191895, 3191899, 3191904, 3191909, 3191913, 3191914, 3191915

MSFT: MS17-2596904, MS17-3114375, MS17-3118310, MS17-3162040, MS17-3162054, MS17-3162069, MS17-3172458, MS17-3172475, MS17-3172482, MS17-3172532, MS17-3172536, MS17-3178633, MS17-3178638, MS17-3178729, MS17-3191835, MS17-3191836, MS17-3191839, MS17-3191841, MS17-3191843, MS17-3191858, MS17-3191863, MS17-3191865, MS17-3191880, MS17-3191881, MS17-3191885, MS17-3191886, MS17-3191887, MS17-3191888, MS17-3191890, MS17-3191895, MS17-3191899, MS17-3191904, MS17-3191909, MS17-3191913, MS17-3191914, MS17-3191915

IAVA: 2017-A-0143