Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects handling can be exploited remotely via a specially designed file to execute arbitrary code;
- An unknown vulnerability can be exploited remotely via a specially designed file to obtain sensitive information.
Technical details
To exploit (2) attacker must first leverage another vulnerability to cause code execution in IE with EPM. Than malicious can execute Excel, Notepad, PowerPoint or another with unsafe command line parameter. Another part of updates for this vulnerability listed in KLA10646, KLA10648
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-1642 high
- CVE-2015-2423 high
- CVE-2015-2466 high
- CVE-2015-2468 high
- CVE-2015-2467 high
- CVE-2015-2469 high
- CVE-2015-2470 high
- CVE-2015-2477 high
KB Liste
- 2687409
- 3054858
- 3054888
- 3054960
- 3039798
- 3054929
- 3055039
- 2965280
- 3055030
- 3055054
- 3055033
- 3055052
- 3055053
- 3055037
- 3055051
- 3054876
- 3054992
- 3054991
- 3054816
- 2965310
- 3055003
- 2553313
- 3054974
- 3082420
- 3055044
- 3080790
- 3081349
- 2596650
- 2986254
- 2598244
- 2837610
- 3039734
- 3055029
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!