MS10-087: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) (Mac OS X)

High Nessus Plugin ID 50531


An application installed on the remote Mac OS X host is affected by multiple remote code execution vulnerabilities.


The remote Mac OS X host is running a version of Microsoft Office that is affected by several vulnerabilities.

If an attacker can trick a user on the affected host into opening a specially crafted Office file, these issues could be leveraged to execute arbitrary code subject to the user's privileges.


Microsoft has released a set of patches for Office for Mac 2011, Office 2008 for Mac, and Open XML File Format Converter for Mac.

See Also

Plugin Details

Severity: High

ID: 50531

File Name: macosx_ms_office_nov2010.nasl

Version: 1.20

Type: local

Agent: macosx

Published: 2010/11/09

Modified: 2017/08/30

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office:2008::mac, cpe:/a:microsoft:office:2011::mac, cpe:/a:microsoft:open_xml_file_format_converter:::mac

Required KB Items: Host/MacOSX/packages, Host/uname

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/11/09

Vulnerability Publication Date: 2010/11/09

Exploitable With

Core Impact

Metasploit (MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format))

Reference Information

CVE: CVE-2010-3333, CVE-2010-3334, CVE-2010-3335, CVE-2010-3336

BID: 44652, 44656, 44659, 44660

OSVDB: 69085, 69086, 69087, 69088

MSFT: MS10-087

MSKB: 2423930, 2454823, 2476511, 2476512