SB2016080929 - Security Update for Microsoft Office
Published: August 9, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory Corruption (CVE-ID: CVE-2016-3313)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted Office document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.
2) Information Disclosure in Microsoft OneNote (CVE-ID: CVE-2016-3315)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to out-of-bound read when handling objects in memory. A remote attacker can create a specially crafted OneNote file and convince a victim to open it.
Successful exploitation of this vulnerability my allow an attacker to obtain potentially sensitive information but requires knowledge of the specific location of OneNote objects in memory.
3) Memory Corruption (CVE-ID: CVE-2016-3316)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted Word document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.
4) Memory Corruption (CVE-ID: CVE-2016-3317)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted Word document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.
5) Memory Corruption in Graphics Component (CVE-ID: CVE-2016-3318)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory within Graphics Component. A remote attacker can create a specially crafted Office document, convince the victim to open it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may allow an attacker to run arbitrary code on vulnerable system.
Remediation
Install update from vendor's website.