Executive Summary

Title Vulnerability in Microsoft Office Could Allow Remote Code Execution (2590602)
Name MS11-089 First vendor Publication 2011-12-13
Vendor Microsoft Last vendor Modification 2012-02-22
Severity (Vendor) Important Revision 1.2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Revision Note: V1.2 (February 22, 2012): Revised the bulletin to identify the update package KB numbers for the following non-affected software that this update applies to: Microsoft Visio (KB2553374), Microsoft Visio Viewer (KB2553353), Microsoft Office Web Application Companions (WAC) (KB2553153), and Microsoft SharePoint Server 2010 (KB2553132). See the update FAQ for details.

Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms11-089

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14558
Oval ID: oval:org.mitre.oval:def:14558
Title: TrueType Font Parsing Vulnerability
Description: Use-after-free vulnerability in Microsoft Office 2007 SP2 and SP3, Office 2010 Gold and SP1, and Office for Mac 2011 allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Use After Free Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-1983
Version: 5
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s): Microsoft Office 2007
Microsoft Office 2010
Definition Synopsis:

CPE : Common Platform Enumeration

Application 7

OpenVAS Exploits

Date Description
2011-12-14 Name : Microsoft Office Remote Code Execution Vulnerability (2590602)
File : nvt/secpod_ms11-089.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
77659 Microsoft Office Use-after-free Border Property Word Document Handling Remote...

Information Assurance Vulnerability Management (IAVM)

Date Description
2011-12-15 IAVM : 2011-A-0163 - Microsoft Office Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0030834

Snort® IPS/IDS

Date Description
2015-03-27 Microsoft Office Word border use-after-free attempt
RuleID : 33568 - Revision : 2 - Type : FILE-OFFICE
2015-03-27 Microsoft Office Word border use-after-free attempt
RuleID : 33567 - Revision : 2 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Word border use-after-free attempt
RuleID : 21002 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Word border use-after-free attempt
RuleID : 20724 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Microsoft Internet Explorer XSRF timing attack against XSS filter
RuleID : 20699 - Revision : 8 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2011-12-13 Name : An application installed on the remote Mac OS X host is affected by multiple ...
File : macosx_ms_office_dec2011.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : Arbitrary code can be executed on the remote host through Microsoft Office.
File : smb_nt_ms11-089.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2016-04-26 23:05:14
  • Multiple Updates
2014-02-17 11:47:10
  • Multiple Updates
2014-01-19 21:30:45
  • Multiple Updates
2013-11-11 12:41:26
  • Multiple Updates
2013-01-30 13:26:53
  • Multiple Updates