Security Updates for Microsoft Project C2R (September 2019)

high Nessus Plugin ID 162102

Synopsis

The Microsoft Project installation on the remote host is missing a security update.

Description

The Microsoft Project installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability :

- A security feature bypass vulnerability exists when Microsoft Office improperly handles input. An attacker who successfully exploited the vulnerability could execute arbitrary commands. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability, and then convince a user to open the document file and interact with the document by clicking a specific cell.
The update addresses the vulnerability by correcting how Microsoft Office handles input. (CVE-2019-1264)

Solution

For Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and manually perform an update.

See Also

http://www.nessus.org/u?fd4508ff

Plugin Details

Severity: High

ID: 162102

File Name: smb_nt_ms19_sep_office_project_c2r.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 6/10/2022

Updated: 6/10/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-1264

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:project_server

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 9/10/2019

Vulnerability Publication Date: 9/10/2019

Reference Information

CVE: CVE-2019-1264