Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects handling can be exploited remotely via a specially designed office file to execute arbitrary code;
- Improper Document Type Definition parsing at SharePoint InfoPath Forms Services can be exploited remotely via a specially designed file to obtain sensitive information;
- Improper request sanitization at Office Web Apps can be exploited remotely via a specially designed URL to spoof user interface.
- Lack of permission restrictions at Microsoft SharePoint can be exploited remotely via a specially designed Office Marketplace instance.
Technical details
To exploit vulnerabilities (2,4) malicious user must be logged in or anonymous access must be enabled
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-2555 high
- CVE-2015-6039 high
- CVE-2015-6037 high
- CVE-2015-2557 high
- CVE-2015-2556 high
- CVE-2015-2558 high
KB Liste
- 3085571
- 3085514
- 3085595
- 3085619
- 3085618
- 3085609
- 3085615
- 2596670
- 3085542
- 3085567
- 3085583
- 3085568
- 3054994
- 3085596
- 3085582
- 3096440
- 3097266
- 2553405
- 3097264
- 3085520
- 2920693
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!