MS15-116: Security Updates for Microsoft Office to Address Remote Code Execution (3104540) (Mac OS X)

High Nessus Plugin ID 86817

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.9

Synopsis

An application installed on the remote Mac OS X host is affected by multiple remote code execution vulnerabilities.

Description

The version of Microsoft Office installed on the remote Mac OS X host is affected by multiple vulnerabilities :

- Multiple remote code execution vulnerabilities exist due to improper handling of objects in memory. A remote attacker can exploit these vulnerabilities by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user. (CVE-2015-6038, CVE-2015-6094)

- A spoofing vulnerability exists in Microsoft Outlook for Mac due to improper sanitization of HTML content. A remote attacker can exploit this, via a crafted email, to spoof content or to chain an attack to other vulnerabilities in web services. (CVE-2015-6123)

Solution

Microsoft has released patches for Office for Mac 2011 and for Office 2016 for Mac.

See Also

https://technet.microsoft.com/library/security/ms15-116

Plugin Details

Severity: High

ID: 86817

File Name: macosx_ms15-116_office.nasl

Version: 1.9

Type: local

Agent: macosx

Published: 2015/11/10

Updated: 2018/07/16

Dependencies: 86383

Risk Information

Risk Factor: High

VPR Score: 8.9

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office:2011:mac, cpe:/a:microsoft:office:2016:mac, cpe:/a:microsoft:excel_for_mac:2011, cpe:/a:microsoft:excel_for_mac:2016

Required KB Items: Host/MacOSX/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/11/10

Vulnerability Publication Date: 2015/11/10

Reference Information

CVE: CVE-2015-6038, CVE-2015-6094, CVE-2015-6123

MSFT: MS15-116

IAVA: 2015-A-0272

MSKB: 3102924, 3102925