Описание
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An improper memory objects handling can be exploited by logged in attacker via a specially designed application to bypass ASLR protection;
- An improper user’s private key import can be exploited remotely via user saved documents manipulations to obtain sensitive information;
- An improper memory objects handling can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper RFC2046 implementation can be exploited remotely via a specially designed email attachment to spoof user interface.
Первичный источник обнаружения
- CVE-2016-3362
CVE-2016-3363
CVE-2016-3364
CVE-2016-3365
CVE-2016-3366
CVE-2016-3358
CVE-2016-0137
CVE-2016-0141
CVE-2016-3357
CVE-2016-3381
CVE-2016-3359
CVE-2016-3360
CVE-2016-3361
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2016-3362 critical
- CVE-2016-3363 critical
- CVE-2016-3364 critical
- CVE-2016-3365 critical
- CVE-2016-3366 warning
- CVE-2016-3358 critical
- CVE-2016-0137 warning
- CVE-2016-0141 warning
- CVE-2016-3357 critical
- CVE-2016-3381 critical
- CVE-2016-3359 critical
- CVE-2016-3360 critical
- CVE-2016-3361 critical
Список KB
- 3118270
- 3115459
- 3118299
- 3118290
- 3118292
- 3118293
- 3115472
- 3118297
- 3115169
- 3118316
- 3114744
- 3118313
- 3115487
- 2597974
- 3054862
- 2553432
- 3115462
- 3115463
- 3115119
- 3115466
- 3115467
- 3115443
- 3115112
- 3054969
- 3118284
- 3186807
- 3186805
- 3118280
- 3118303
- 3118300
- 3118268
- 3118309
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!