Security Updates for Microsoft Office Products (January 2018)

high Nessus Plugin ID 105728

Synopsis

The Microsoft Office Products are missing a security update.

Description

The Microsoft Office Products are missing security updates.
It is, therefore, affected by the following vulnerabilities :

- A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2018-0794, CVE-2018-0795)

- An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2018-0797)

- A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2018-0798, CVE-2018-0801, CVE-2018-0802, CVE-2018-0804, CVE-2018-0805, CVE-2018-0806, CVE-2018-0807, CVE-2018-0812)

- A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages. An attacker who successfully exploited the vulnerability could take control of an affected system.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Outlook. (CVE-2018-0793)

Solution

Microsoft has released the following security updates to address this issue:
-KB4011201
-KB4011574
-KB4011580
-KB4011610
-KB4011611
-KB4011622
-KB4011632
-KB4011636
-KB4011656
-KB4011658

See Also

http://www.nessus.org/u?e1b2b6d9

http://www.nessus.org/u?85b6869a

http://www.nessus.org/u?7d51c8cf

http://www.nessus.org/u?e7a15426

http://www.nessus.org/u?00956959

http://www.nessus.org/u?40ab628d

http://www.nessus.org/u?7cb9348d

http://www.nessus.org/u?479ec626

http://www.nessus.org/u?cf086d09

http://www.nessus.org/u?2b10eed9

Plugin Details

Severity: High

ID: 105728

File Name: smb_nt_ms18_jan_office.nasl

Version: 1.13

Type: local

Agent: windows

Published: 1/10/2018

Updated: 4/25/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-0862

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/9/2018

Vulnerability Publication Date: 1/9/2018

CISA Known Exploited Vulnerability Due Dates: 5/3/2022

Exploitable With

Core Impact

Reference Information

CVE: CVE-2018-0793, CVE-2018-0794, CVE-2018-0795, CVE-2018-0797, CVE-2018-0798, CVE-2018-0801, CVE-2018-0802, CVE-2018-0804, CVE-2018-0805, CVE-2018-0806, CVE-2018-0807, CVE-2018-0812, CVE-2018-0845, CVE-2018-0848, CVE-2018-0849, CVE-2018-0862

BID: 102347, 102348, 102356, 102370, 102373, 102375, 102406, 102457, 102459, 102460, 102461, 102463

IAVA: 2018-A-0009-S

MSFT: MS17-4011201, MS17-4011574, MS17-4011580, MS17-4011610, MS17-4011611, MS17-4011622, MS17-4011632, MS17-4011636, MS17-4011656, MS17-4011658

MSKB: 4011201, 4011574, 4011580, 4011610, 4011611, 4011622, 4011632, 4011636, 4011656, 4011658