Security Updates for Microsoft Office Products (April 2020) (macOS)

high Nessus Plugin ID 135589

Synopsis

An application installed on the remote macOS or Mac OS X host is affected by multiple vulnerabilities.

Description

The Microsoft Office application installed on the remote macOS or Mac OS X host is missing a security update. It is, therefore, affected by a remote code execution vulnerability in Microsoft Word software due to failure to properly handle objects in memory. An attacker could use a specially crafted file to perform actions in the security context of the current user. To exploit this issue, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

Solution

Microsoft has released a set of patches for Microsoft Office for Mac.

See Also

http://www.nessus.org/u?17ce16bb

http://www.nessus.org/u?dae26676

Plugin Details

Severity: High

ID: 135589

File Name: macos_ms20_apr_office.nasl

Version: 1.5

Type: local

Agent: macosx

Published: 4/15/2020

Updated: 12/11/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-0980

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:powerpoint, cpe:/a:microsoft:onenote, cpe:/a:microsoft:excel, cpe:/a:microsoft:outlook, cpe:/o:apple:mac_os_x, cpe:/a:microsoft:word, cpe:/a:microsoft:office

Required KB Items: Host/MacOSX/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2020

Vulnerability Publication Date: 4/14/2020

Reference Information

CVE: CVE-2020-0980

IAVA: 2020-A-0142-S