MS15-116: Security Update for Microsoft Office to Address Remote Code Execution (3104540)

high Nessus Plugin ID 86823

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows host has a version of Microsoft Office, Access, Excel, InfoPath, OneNote, PowerPoint, Project, Publisher, Visio, Word, Excel Viewer, Word Viewer, SharePoint Server, Office Compatibility Pack, Office Web Apps, Skype for Business, or Lync installed that is affected by multiple vulnerabilities :

- Multiple remote code execution vulnerabilities exist due to improper handling of objects in memory. A remote attacker can exploit these vulnerabilities by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user. (CVE-2015-6038, CVE-2015-6091, CVE-2015-6092, CVE-2015-6093, CVE-2015-6094)

- An elevation of privilege vulnerability exists when an attacker instantiates an affected Office application via a COM control. An attacker who successfully exploits this vulnerability can gain elevated privileges and break out of the Internet Explorer sandbox.
(CVE-2015-2503)

Solution

Microsoft has released a set of patches for Office 2007, 2010, 2013, 2013 RT, 2016; SharePoint Server 2007, 2010, 2013; Office Compatibility Pack, Excel Viewer, Word Viewer, Office Web Apps 2010 and 2013, and Lync 2013 and 2016.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-116

Plugin Details

Severity: High

ID: 86823

File Name: smb_nt_ms15-116.nasl

Version: 1.15

Type: local

Agent: windows

Published: 11/10/2015

Updated: 2/17/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:microsoft:word, cpe:/a:microsoft:office, cpe:/a:microsoft:visio, cpe:/a:microsoft:skype_for_business_server, cpe:/a:microsoft:excel_viewer, cpe:/a:microsoft:access, cpe:/a:microsoft:publisher, cpe:/a:microsoft:powerpoint, cpe:/a:microsoft:sharepoint_server, cpe:/a:microsoft:office_web_apps, cpe:/a:microsoft:infopath, cpe:/a:microsoft:pinyin_ime, cpe:/a:microsoft:onenote, cpe:/a:microsoft:lync_basic, cpe:/a:microsoft:excel, cpe:/a:microsoft:office_compatibility_pack, cpe:/a:microsoft:project, cpe:/a:microsoft:word_viewer, cpe:/a:microsoft:lync

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/10/2015

Vulnerability Publication Date: 11/10/2015

Reference Information

CVE: CVE-2015-2503, CVE-2015-6038, CVE-2015-6091, CVE-2015-6092, CVE-2015-6093, CVE-2015-6094

BID: 77485, 77489, 77490, 77491, 77492, 77493