Description
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects handling can be exploited remotely via a specially designed office file to execute arbitrary code;
- Improper Document Type Definition parsing at SharePoint InfoPath Forms Services can be exploited remotely via a specially designed file to obtain sensitive information;
- Improper request sanitization at Office Web Apps can be exploited remotely via a specially designed URL to spoof user interface.
- Lack of permission restrictions at Microsoft SharePoint can be exploited remotely via a specially designed Office Marketplace instance.
Technical details
To exploit vulnerabilities (2,4) malicious user must be logged in or anonymous access must be enabled
Original advisories
Related products
CVE list
- CVE-2015-2555 critical
- CVE-2015-6039 warning
- CVE-2015-6037 warning
- CVE-2015-2557 critical
- CVE-2015-2556 warning
- CVE-2015-2558 critical
KB list
- 3085571
- 3085514
- 3085595
- 3085619
- 3085618
- 3085609
- 3085615
- 2596670
- 3085542
- 3085567
- 3085583
- 3085568
- 3054994
- 3085596
- 3085582
- 3096440
- 3097266
- 2553405
- 3097264
- 3085520
- 2920693
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!