Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An improper memory objects handling can be exploited by logged in attacker via a specially designed application to bypass ASLR protection;
- An improper user’s private key import can be exploited remotely via user saved documents manipulations to obtain sensitive information;
- An improper memory objects handling can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper RFC2046 implementation can be exploited remotely via a specially designed email attachment to spoof user interface.
Ursprüngliche Informationshinweise
- CVE-2016-3363
- CVE-2016-3364
- CVE-2016-3365
- CVE-2016-3366
- CVE-2016-3358
- CVE-2016-0137
- CVE-2016-0141
- CVE-2016-3357
- CVE-2016-3381
- CVE-2016-3359
- CVE-2016-3360
- CVE-2016-3361
CVE Liste
- CVE-2016-3362 high
- CVE-2016-3363 high
- CVE-2016-3364 high
- CVE-2016-3365 high
- CVE-2016-3366 high
- CVE-2016-3358 high
- CVE-2016-0137 high
- CVE-2016-0141 high
- CVE-2016-3357 high
- CVE-2016-3381 high
- CVE-2016-3359 high
- CVE-2016-3360 high
- CVE-2016-3361 high
KB Liste
- 3118270
- 3115459
- 3118299
- 3118290
- 3118292
- 3118293
- 3115472
- 3118297
- 3115169
- 3118316
- 3114744
- 3118313
- 3115487
- 2597974
- 3054862
- 2553432
- 3115462
- 3115463
- 3115119
- 3115466
- 3115467
- 3115443
- 3115112
- 3054969
- 3118284
- 3186807
- 3186805
- 3118280
- 3118303
- 3118300
- 3118268
- 3118309
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!