Executive Summary

Summary
TitleSecurity Update for Microsoft Office (3177451)
Informations
NameMS16-099First vendor Publication2016-08-09
VendorMicrosoftLast vendor Modification2016-08-22
Severity (Vendor) N/ARevision2.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V2.0 (August 22, 2016): V2.0 (August 22, 2016): Bulletin revised to announce the availability of the 14.6.7 update for Microsoft Office for Mac 2011 (3179162) and the 15.25 update for Microsoft Office 2016 for Mac (3179163). Customers running affected Mac software should install the appropriate update for their product to be protected from the vulnerabilities discussed in this bulletin. Customers running other Microsoft Office software do not need to take any action. See Microsoft Knowledge Base Article 3179162 and Microsoft Knowledge Base Article 3179163 for more information and download links.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-099

CWE : Common Weakness Enumeration

%idName
80 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
20 %CWE-200Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application4
Application5
Application1
Application5
Application2
Application1

Snort® IPS/IDS

DateDescription
2018-08-16Microsoft Office Word sprmSDyaTop memory leak attempt
RuleID : 47206 - Revision : 1 - Type : FILE-OFFICE
2018-08-16Microsoft Office Word sprmSDyaTop memory leak attempt
RuleID : 47205 - Revision : 1 - Type : FILE-OFFICE
2016-09-08Microsoft Office mso.dll out of bounds memory access attempt
RuleID : 39838 - Revision : 2 - Type : FILE-OFFICE
2016-09-08Microsoft Office mso.dll out of bounds memory access attempt
RuleID : 39837 - Revision : 2 - Type : FILE-OFFICE
2016-09-08Microsoft Office Word malformed jpeg memory corruption attempt
RuleID : 39836 - Revision : 3 - Type : FILE-OFFICE
2016-09-08Microsoft Office Word malformed jpeg memory corruption attempt
RuleID : 39835 - Revision : 3 - Type : FILE-OFFICE
2016-09-08Microsoft Office Word wwlib out of bounds read attempt
RuleID : 39832 - Revision : 2 - Type : FILE-OFFICE
2016-09-08Microsoft Office Word wwlib out of bounds read attempt
RuleID : 39831 - Revision : 2 - Type : FILE-OFFICE
2016-09-08Microsoft Office Word sprmSDyaTop memory leak attempt
RuleID : 39817 - Revision : 6 - Type : FILE-OFFICE
2016-09-08Microsoft Office Word sprmSDyaTop memory leak attempt
RuleID : 39816 - Revision : 6 - Type : FILE-OFFICE

Nessus® Vulnerability Scanner

DateDescription
2016-08-10Name : An application installed on the remote Windows host is affected by multiple v...
File : smb_nt_ms16-099.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
DateInformations
2017-01-07 13:25:59
  • Multiple Updates
2016-08-22 21:25:59
  • Multiple Updates
2016-08-22 21:17:55
  • Multiple Updates
2016-08-12 05:22:23
  • Multiple Updates
2016-08-12 05:16:27
  • Multiple Updates
2016-08-11 21:24:55
  • Multiple Updates
2016-08-11 13:26:57
  • Multiple Updates
2016-08-10 13:25:32
  • Multiple Updates
2016-08-10 05:24:35
  • Multiple Updates
2016-08-09 21:26:16
  • Multiple Updates
2016-08-09 21:17:51
  • First insertion