Описание
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects handling can be exploited remotely via a specially designed office file to execute arbitrary code;
- Improper Document Type Definition parsing at SharePoint InfoPath Forms Services can be exploited remotely via a specially designed file to obtain sensitive information;
- Improper request sanitization at Office Web Apps can be exploited remotely via a specially designed URL to spoof user interface.
- Lack of permission restrictions at Microsoft SharePoint can be exploited remotely via a specially designed Office Marketplace instance.
Technical details
To exploit vulnerabilities (2,4) malicious user must be logged in or anonymous access must be enabled
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2015-2555 critical
- CVE-2015-6039 warning
- CVE-2015-6037 warning
- CVE-2015-2557 critical
- CVE-2015-2556 warning
- CVE-2015-2558 critical
Список KB
- 3085571
- 3085514
- 3085595
- 3085619
- 3085618
- 3085609
- 3085615
- 2596670
- 3085542
- 3085567
- 3085583
- 3085568
- 3054994
- 3085596
- 3085582
- 3096440
- 3097266
- 2553405
- 3097264
- 3085520
- 2920693
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!