MS17-002: Security Update for Microsoft Office (3214291)

High Nessus Plugin ID 96391


An application installed on the remote host is affected by a remote code execution vulnerability.


The version of Microsoft Word or Microsoft SharePoint Server installed on the remote Windows host is missing a security update. It is, therefore, affected by a memory corruption issue due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or open a specially crafted Office file, to execute arbitrary code in the context of the current user.


Microsoft has released a set of patches for Microsoft Word 2016 and SharePoint Server 2016

See Also

Plugin Details

Severity: High

ID: 96391

File Name: smb_nt_ms17-002.nasl

Version: 1.8

Type: local

Agent: windows

Published: 2017/01/10

Updated: 2018/11/15

Dependencies: 74250, 13855, 27524, 57033

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:word, cpe:/a:microsoft:sharepoint_server

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/01/10

Vulnerability Publication Date: 2017/01/10

Reference Information

CVE: CVE-2017-0003

MSFT: MS17-002

MSKB: 3128057, 3141486

IAVA: 2017-A-0009