Security Updates for Microsoft Office (October 2020) (macOS)

high Nessus Plugin ID 141470

Synopsis

The Microsoft Office product installed on the remote host is affected by multiple vulnerabilities.

Description

The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:

- A remote code execution vulnerability exists when the Base3D rendering engine handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. (CVE-2020-16918)

- A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. (CVE-2020-16929)

- A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. (CVE-2020-16933)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Microsoft has released a set of patches for Microsoft Office for Mac.

Plugin Details

Severity: High

ID: 141470

File Name: macos_ms20_oct_office.nasl

Version: 1.10

Type: local

Agent: macosx

Published: 10/15/2020

Updated: 11/29/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-16918

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2020-16933

Vulnerability Information

CPE: cpe:/a:microsoft:office

Required KB Items: Host/MacOSX/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/13/2020

Vulnerability Publication Date: 10/13/2020

Reference Information

CVE: CVE-2020-16918, CVE-2020-16929, CVE-2020-16933

IAVA: 2020-A-0454-S