Synopsis
The Microsoft Sharepoint Server installation on the remote host is affected by multiple vulnerabilities.
Description
The Microsoft Sharepoint Server installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists when Microsoft Excel software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel software. The security update addresses the vulnerability by properly initializing the affected variable. (CVE-2018-8627)
- An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted authentication request to an affected SharePoint server. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable server in the context of the SharePoint application pool account. (CVE-2018-8635)
- An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).
When users are simultaneously logged in to Microsoft SharePoint Server and visit a malicious web page, the attacker can, through standard browser functionality, induce the browser to invoke search queries as the logged in user. While the attacker cant access the search results or documents as such, the attacker can determine whether the query did return results or not, and thus by issuing targeted queries discover facts about documents that are searchable for the logged-in user. The security update addresses the vulnerability by running the search queries in a way that doesnt expose them to this browser vulnerability. (CVE-2018-8580)
- A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8628)
Solution
Microsoft has released the following security updates to address this issue:
-KB2965309
-KB4092468
-KB4092472
-KB4461558
-KB4461569
-KB4461548
-KB4461549
-KB4461465
-KB4461580
-KB4461541
Plugin Details
File Name: smb_nt_ms18_dec_office_sharepoint.nasl
Agent: windows
Supported Sensors: Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:microsoft:sharepoint_server:2010, cpe:/a:microsoft:sharepoint_foundation, cpe:/a:microsoft:sharepoint_server:2019, cpe:/a:microsoft:sharepoint_server:2013, cpe:/a:microsoft:sharepoint_server:2016, cpe:/a:microsoft:office
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Ease: No known exploits are available
Patch Publication Date: 12/11/2018
Vulnerability Publication Date: 12/11/2018
Reference Information
CVE: CVE-2018-8580, CVE-2018-8627, CVE-2018-8628, CVE-2018-8635, CVE-2018-8650
MSFT: MS18-2965309, MS18-4092468, MS18-4092472, MS18-4461465, MS18-4461541, MS18-4461548, MS18-4461549, MS18-4461558, MS18-4461569, MS18-4461580
MSKB: 2965309, 4092468, 4092472, 4461465, 4461541, 4461548, 4461549, 4461558, 4461569, 4461580