Description
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code or obtain sensitive information. Below is a complete list of vulnerabilities
- An improper memory objects handling can be exploited by logged in attacker via a specially designed application to bypass ASLR protection;
- An improper user’s private key import can be exploited remotely via user saved documents manipulations to obtain sensitive information;
- An improper memory objects handling can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper RFC2046 implementation can be exploited remotely via a specially designed email attachment to spoof user interface.
Original advisories
- CVE-2016-3363
- CVE-2016-3365
- CVE-2016-3366
- CVE-2016-3358
- CVE-2016-0137
- CVE-2016-0141
- CVE-2016-3381
- CVE-2016-3359
- CVE-2016-3360
- CVE-2016-3361
Related products
CVE list
- CVE-2016-3362 unknown
- CVE-2016-3363 unknown
- CVE-2016-3365 unknown
- CVE-2016-3366 unknown
- CVE-2016-3358 unknown
- CVE-2016-0137 unknown
- CVE-2016-0141 unknown
- CVE-2016-3381 unknown
- CVE-2016-3359 unknown
- CVE-2016-3360 unknown
- CVE-2016-3361 unknown
KB list
- 3118270
- 3115459
- 3118299
- 3118290
- 3118292
- 3118293
- 3115472
- 3115169
- 3118316
- 3114744
- 3118313
- 3115487
- 2597974
- 3054862
- 3115462
- 3115463
- 3115119
- 3115467
- 3115112
- 3054969
- 3118284
- 3186807
- 3118280
- 3118303
- 3118300
- 3118268
- 3118309
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!