Synopsis
The Microsoft SharePoint Server or Microsoft Project Server installation on the remote host is missing security updates.
Description
The Microsoft SharePoint Server or Microsoft Project Server installation on the remote host is missing security updates. It is, therefore, affected by the following vulnerabilities :
- An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.
(CVE-2018-0789, CVE-2018-0790)
- A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (CVE-2018-0792)
- An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (CVE-2018-0797)
- A cross-site-scripting (XSS) vulnerability exists when Microsoft Access does not properly sanitize inputs to image fields edited within Design view. An attacker could exploit the vulnerability by sending a specially crafted file to a victim, or by hosting the file on a web server. (CVE-2018-0799)
Solution
Microsoft has released the following security updates to address this issue:
- KB3114998
- KB3141547
- KB4011579
- KB4011599
- KB4011609
- KB4011642
- KB4011653
Plugin Details
File Name: smb_nt_ms18_jan_office_sharepoint.nasl
Agent: windows
Supported Sensors: Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:microsoft:sharepoint_server:2010, cpe:/a:microsoft:sharepoint_foundation, cpe:/a:microsoft:sharepoint_server:2013, cpe:/a:microsoft:sharepoint_server:2016, cpe:/a:microsoft:office
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Ease: No known exploits are available
Patch Publication Date: 1/9/2018
Vulnerability Publication Date: 1/9/2018
Reference Information
CVE: CVE-2018-0789, CVE-2018-0790, CVE-2018-0792, CVE-2018-0797, CVE-2018-0799
BID: 102381, 102391, 102394, 102406, 102411
IAVA: 2018-A-0009-S
MSFT: MS18-3114998, MS18-3141547, MS18-4011579, MS18-4011599, MS18-4011609, MS18-4011642, MS18-4011653
MSKB: 3114998, 3141547, 4011579, 4011599, 4011609, 4011642, 4011653