Security Update for Live Meeting 2007 / Lync 2010 and 2013 / Skype for Business 2016 (June 2017)

high Nessus Plugin ID 100768

Synopsis

An application installed on the remote Windows host is affected by a remote code execution vulnerability.

Description

The Microsoft Live Meeting 2007, Lync 2010, Lync 2013, or Skype 2016 for Business application installed on the remote Windows host is missing a security update. It is, therefore, affected remote code execution vulnerability in Windows Uniscribe software due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to execute arbitrary code in the context of the current user.

Solution

Microsoft has released a set of patches for Lync 2010, Lync 2013, and Skype for Business 2016.

See Also

https://support.microsoft.com/en-us/help/3203382/descriptionofthesecurityupdateforskypeforbusiness2016june13-2017

https://support.microsoft.com/en-us/help/3191939/description-of-the-security-update-for-skype-for-business-2015-lync-20

http://www.nessus.org/u?19ae218b

http://www.nessus.org/u?230084fb

http://www.nessus.org/u?9297a074

http://www.nessus.org/u?37af777f

http://www.nessus.org/u?5c3c3e16

Plugin Details

Severity: High

ID: 100768

File Name: smb_nt_ms17_jun_skype.nasl

Version: 1.18

Type: local

Agent: windows

Published: 6/13/2017

Updated: 2/17/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:lync, cpe:/a:microsoft:live_meeting, cpe:/a:microsoft:live_meeting_console, cpe:/a:microsoft:skype_for_business

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/13/2017

Vulnerability Publication Date: 6/13/2017

Reference Information

CVE: CVE-2017-0283

BID: 98920

IAVA: 2017-A-0179-S

MSFT: MS17-3191939, MS17-3203382, MS17-4020732, MS17-4020733, MS17-4020734, MS17-4020735, MS17-4020736

MSKB: 3191939, 3203382, 4020732, 4020733, 4020734, 4020735, 4020736