KLA50318
Multiple vulnerabilities in Microsoft Office

Обновлено: 29/09/2023
Дата обнаружения
13/06/2023
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft OneNote can be exploited remotely to spoof user interface.
  4. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  5. A denial of service vulnerability in Microsoft SharePoint can be exploited remotely to cause denial of service.
  6. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  7. A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
  9. Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Microsoft Office Online Server
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft Outlook 2016 (32-bit edition)
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2016 (64-bit edition)
Microsoft SharePoint Server 2019
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2019 for 32-bit editions
Microsoft SharePoint Enterprise Server 2016
Microsoft Outlook 2013 (64-bit editions)
Microsoft Outlook 2016 (64-bit edition)
Microsoft Excel 2016 (32-bit edition)
Microsoft Office 2019 for Mac
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft SharePoint Server Subscription Edition
Microsoft Office 2019 for 64-bit editions
Microsoft OneNote for Universal
Microsoft Outlook 2013 (32-bit editions)
Microsoft Outlook 2013 RT Service Pack 1

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)
Install Office updates

Первичный источник обнаружения
CVE-2023-33142
CVE-2023-33133
CVE-2023-33140
CVE-2023-33132
CVE-2023-33129
CVE-2023-33137
CVE-2023-33130
CVE-2023-33146
CVE-2023-29357
CVE-2023-32029
CVE-2023-33131
CVE-2023-27909
CVE-2023-27911
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Office
Microsoft Outlook
Microsoft Excel
Microsoft SharePoint
CVE-IDS
CVE-2023-279095.0Warning
CVE-2023-279115.0Warning
CVE-2023-331425.0Warning
CVE-2023-331335.0Warning
CVE-2023-331405.0Warning
CVE-2023-331325.0Warning
CVE-2023-331295.0Warning
CVE-2023-331375.0Warning
CVE-2023-331305.0Warning
CVE-2023-331465.0Warning
CVE-2023-293575.0Warning
CVE-2023-320295.0Warning
CVE-2023-331315.0Warning
KB list

5002402
5002416
5002405
5002403
5002387
5002382
5002404
5002401
5002414