MS10-087: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) (Mac OS X)

high Nessus Plugin ID 50531

Synopsis

An application installed on the remote Mac OS X host is affected by multiple remote code execution vulnerabilities.

Description

The remote Mac OS X host is running a version of Microsoft Office that is affected by several vulnerabilities.

If an attacker can trick a user on the affected host into opening a specially crafted Office file, these issues could be leveraged to execute arbitrary code subject to the user's privileges.

Solution

Microsoft has released a set of patches for Office for Mac 2011, Office 2008 for Mac, and Open XML File Format Converter for Mac.

See Also

http://technet.microsoft.com/en-us/security/bulletin/ms10-087

Plugin Details

Severity: High

ID: 50531

File Name: macosx_ms_office_nov2010.nasl

Version: 1.29

Type: local

Agent: macosx

Published: 11/9/2010

Updated: 7/24/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2010-3336

Vulnerability Information

CPE: cpe:/a:microsoft:open_xml_file_format_converter:::mac, cpe:/a:microsoft:office:2011::mac, cpe:/a:microsoft:office:2008::mac

Required KB Items: Host/uname, Host/MacOSX/packages

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/9/2010

Vulnerability Publication Date: 11/9/2010

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

Core Impact

Metasploit (MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format))

Reference Information

CVE: CVE-2010-3333, CVE-2010-3334, CVE-2010-3335, CVE-2010-3336

BID: 44652, 44656, 44659, 44660

MSFT: MS10-087

MSKB: 2423930, 2454823, 2476511, 2476512