KLA11976
Multiple vulnerabilites in Microsoft Office

Обновлено: 28/09/2023
Дата обнаружения
13/10/2020
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Microsoft Office Click-to-Run can be exploited remotely via specially crafted file to gain privileges.
  2. A remote code execution vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
  3. An information disclosure vulnerability in Microsoft SharePoint can be exploited remotely to obtain sensitive information.
  4. A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted web to spoof user interface.
  5. A remote code execution vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
  6. A cross-site-scripting (XSS) vulnerability Microsoft SharePoint Reflective can be exploited remotely via specially crafted request to spoof user interface.
  7. An information disclosure vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted application to obtain sensitive information.
  8. A denial of service vulnerability in Microsoft Outlook can be exploited remotely via specially crafted email to cause denial of service.
  9. A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted to execute arbitrary code.
  10. A remote code execution vulnerability in Microsoft Office can be exploited remotely via specially crafted file to execute arbitrary code.
  11. A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted to execute arbitrary code.
  12. A security feature bypass vulnerability in Microsoft Word can be exploited remotely via specially crafted file to bypass security restrictions.
  13. A remote code execution vulnerability in Base3D can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in Microsoft Office Access Connectivity Engine can be exploited remotely via specially crafted file to execute arbitrary code.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft SharePoint Server 2019
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2013 RT Service Pack 1
3D Viewer
Microsoft Office 2016 (64-bit edition)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Word 2013 RT Service Pack 1
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft Office Online Server
Microsoft Word 2016 (32-bit edition)
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Outlook 2016 (32-bit edition)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Excel Web App 2010 Service Pack 2
Microsoft Excel 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft SharePoint Enterprise Server 2016
Microsoft Excel 2016 (64-bit edition)
Microsoft Outlook 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for Mac
Microsoft Office 2016 for Mac
Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2020-16928
CVE-2020-16929
CVE-2020-16941
CVE-2020-16946
CVE-2020-16947
CVE-2020-16944
CVE-2020-16945
CVE-2020-16948
CVE-2020-16949
CVE-2020-16942
CVE-2020-16932
CVE-2020-16952
CVE-2020-16955
CVE-2020-16954
CVE-2020-16951
CVE-2020-16950
CVE-2020-16953
CVE-2020-16934
CVE-2020-16933
CVE-2020-16918
CVE-2020-16957
CVE-2020-16930
CVE-2020-16931
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Office
Microsoft Outlook
Microsoft Excel
Microsoft Word
CVE-IDS
KB list

4486682
4486678
4484417
4486676
4486694
4486707
4486701
4486687
4486708
4486677
4486674
4486688
4484524
4486663
4486689
4484531
4486700
4486679
4486695
4486703
4484435
4486692
4462175
4486671