Security Updates for Microsoft Sharepoint Server (December 2018)

high Nessus Plugin ID 119686

Synopsis

The Microsoft Sharepoint Server installation on the remote host is affected by multiple vulnerabilities.

Description

The Microsoft Sharepoint Server installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerability exists when Microsoft Excel software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel software. The security update addresses the vulnerability by properly initializing the affected variable. (CVE-2018-8627)

- An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted authentication request to an affected SharePoint server. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable server in the context of the SharePoint application pool account. (CVE-2018-8635)

- An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).
When users are simultaneously logged in to Microsoft SharePoint Server and visit a malicious web page, the attacker can, through standard browser functionality, induce the browser to invoke search queries as the logged in user. While the attacker cant access the search results or documents as such, the attacker can determine whether the query did return results or not, and thus by issuing targeted queries discover facts about documents that are searchable for the logged-in user. The security update addresses the vulnerability by running the search queries in a way that doesnt expose them to this browser vulnerability. (CVE-2018-8580)

- A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8628)

Solution

Microsoft has released the following security updates to address this issue:
-KB2965309
-KB4092468
-KB4092472
-KB4461558
-KB4461569
-KB4461548
-KB4461549
-KB4461465
-KB4461580
-KB4461541

See Also

http://www.nessus.org/u?70c99df5

http://www.nessus.org/u?00f6be56

http://www.nessus.org/u?4997c825

http://www.nessus.org/u?6fab3001

http://www.nessus.org/u?de9bd607

http://www.nessus.org/u?e996ac3b

Plugin Details

Severity: High

ID: 119686

File Name: smb_nt_ms18_dec_office_sharepoint.nasl

Version: 1.8

Type: local

Agent: windows

Published: 12/14/2018

Updated: 6/6/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-8628

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2018-8635

Vulnerability Information

CPE: cpe:/a:microsoft:sharepoint_server:2010, cpe:/a:microsoft:sharepoint_foundation, cpe:/a:microsoft:sharepoint_server:2019, cpe:/a:microsoft:sharepoint_server:2013, cpe:/a:microsoft:sharepoint_server:2016, cpe:/a:microsoft:office

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 12/11/2018

Vulnerability Publication Date: 12/11/2018

Reference Information

CVE: CVE-2018-8580, CVE-2018-8627, CVE-2018-8628, CVE-2018-8635, CVE-2018-8650

MSFT: MS18-2965309, MS18-4092468, MS18-4092472, MS18-4461465, MS18-4461541, MS18-4461548, MS18-4461549, MS18-4461558, MS18-4461569, MS18-4461580

MSKB: 2965309, 4092468, 4092472, 4461465, 4461541, 4461548, 4461549, 4461558, 4461569, 4461580