Executive Summary

Summary
TitleSecurity Update for Microsoft Office to Address Remote Code Execution (3141806)
Informations
NameMS16-029First vendor Publication2016-03-08
VendorMicrosoftLast vendor Modification2016-03-16
Severity (Vendor) N/ARevision2.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V2.0 (March 16, 2016): Bulletin revised to announce that the 3138327 update is available for Microsoft Office 2016 for Mac, and the 3138328 update is available for Microsoft Office for Mac 2011. Please note that the 3138327 update for Microsoft Outlook 2016 for Mac was not released on March 16. This update will be released as soon as it is available and users will be notified via a bulletin revision. For more information, see Microsoft Knowledge Base Article 3138327 and Microsoft Knowledge Base Article 3138328.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-029

CWE : Common Weakness Enumeration

%idName
67 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
33 %CWE-264Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application3
Application6
Application1
Application2
Application2
Application5
Application2
Application1

Snort® IPS/IDS

DateDescription
2016-04-07Microsoft Office Word ipdesign.dll ActiveX object access attempt
RuleID : 38129 - Revision : 2 - Type : FILE-OFFICE
2016-04-07Microsoft Office Word ipdesign.dll ActiveX object access attempt
RuleID : 38128 - Revision : 2 - Type : FILE-OFFICE
2016-04-07Microsoft Office Word ipdesign.dll ActiveX object access attempt
RuleID : 38127 - Revision : 2 - Type : FILE-OFFICE
2016-04-07Microsoft Office Word ipdesign.dll ActiveX object access attempt
RuleID : 38126 - Revision : 2 - Type : FILE-OFFICE
2016-04-07Microsoft Office Word wwlib.dll invalid pointer read attempt
RuleID : 38101 - Revision : 3 - Type : FILE-OFFICE
2016-04-07Microsoft Office Word wwlib.dll invalid pointer read attempt
RuleID : 38100 - Revision : 3 - Type : FILE-OFFICE

Nessus® Vulnerability Scanner

DateDescription
2016-03-17Name : An application installed on the remote Mac OS X host is affected by a remote ...
File : macosx_ms16-029_office.nasl - Type : ACT_GATHER_INFO
2016-03-08Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms16-029.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
DateInformations
2016-04-27 05:05:16
  • Multiple Updates
2016-03-18 13:26:06
  • Multiple Updates
2016-03-17 05:26:44
  • Multiple Updates
2016-03-17 05:16:09
  • Multiple Updates
2016-03-11 21:30:44
  • Multiple Updates
2016-03-11 17:27:35
  • Multiple Updates
2016-03-09 17:27:52
  • Multiple Updates
2016-03-09 13:25:54
  • Multiple Updates
2016-03-08 21:28:05
  • Multiple Updates
2016-03-08 21:16:35
  • First insertion