ID CVE-2016-3313 Type cve Reporter cve@mitre.org Modified 2018-10-30T16:27:00
Description
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."
{"symantec": [{"lastseen": "2018-03-13T12:07:31", "bulletinFamily": "software", "cvelist": ["CVE-2016-3313"], "description": "### Description\n\nMicrosoft Office is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory. An attacker can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial of service conditions.\n\n### Technologies Affected\n\n * Microsoft Microsoft Office 2007 Service Pack 3 \n * Microsoft Office 2010 Service Pack 2 (32-bit editions) \n * Microsoft Office 2010 Service Pack 2 (64-bit editions) \n * Microsoft Office 2013 RT Service Pack 1 \n * Microsoft Office 2013 Service Pack 1 (32-bit editions) \n * Microsoft Office 2013 Service Pack 1 (64-bit editions) \n * Microsoft Office 2016 (32-bit edition) \n * Microsoft Office 2016 (64-bit edition) \n * Microsoft Word Viewer \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of suspicious or anomalous activity. This may help detect malicious actions that an attacker may take after successfully exploiting vulnerabilities in applications. Review all applicable logs regularly.\n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo reduce the likelihood of successful exploits, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Implement multiple redundant layers of security.** \nSince this issue may be leveraged to execute code, we recommend memory-protection schemes, such as nonexecutable stack/heap configurations and randomly mapped memory segments. This tactic may complicate exploits of memory-corruption vulnerabilities.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2016-08-09T00:00:00", "published": "2016-08-09T00:00:00", "id": "SMNTC-92289", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/92289", "type": "symantec", "title": "Microsoft Office CVE-2016-3313 Memory Corruption Vulnerability", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "zdt": [{"lastseen": "2018-04-04T19:30:25", "description": "Exploit for windows platform in category local exploits", "edition": 2, "published": "2016-08-10T00:00:00", "type": "zdt", "title": "Microsoft Word 2007/2010/2013/2016 - Out-of-Bounds Read Remote Code Execution (MS16-099)", "bulletinFamily": "exploit", "cvelist": ["CVE-2016-3313"], "modified": "2016-08-10T00:00:00", "id": "1337DAY-ID-25632", "href": "https://0day.today/exploit/description/25632", "sourceData": "#####################################################################################\r\n \r\n# Application: Microsoft Office Word\r\n# Platforms: Windows, OSX\r\n# Versions: Microsoft Office Word 2007,2010,2013,2016\r\n# Author: S\u00e9bastien Morin of COSIG\r\n# Website: https://cosig.gouv.qc.ca/en/advisory/\r\n# Twitter: @SebMorin1, @COSIG_\r\n# Date: August 09, 2016\r\n# CVE: CVE-2016-3313\r\n# COSIG-2016-31\r\n \r\n#####################################################################################\r\n \r\n1) Introduction\r\n2) Report Timeline\r\n3) Technical details\r\n4) POC\r\n \r\n#######################################################################################\r\n \r\n===================\r\n1) Introduction\r\n===================\r\n \r\nMicrosoft Word is a word processor developed by Microsoft. It was first released on October 25, 1983[3] under the name Multi-Tool Word for Xenix systems.[4][5][6] Subsequent versions were later written for several other platforms including IBM PCs running DOS (1983), Apple Macintosh running Mac OS (1985), AT&T Unix PC (1985), Atari ST (1988), OS/2 (1989), Microsoft Windows (1989) and SCO Unix (1994). Commercial versions of Word are licensed as a standalone product or as a component of Microsoft Office, Windows RT or the discontinued Microsoft Works suite. Microsoft Word Viewer and Office Online are Freeware editions of Word with limited features.\r\n \r\n(https://en.wikipedia.org/wiki/Microsoft_Word)\r\n \r\n#######################################################################################\r\n \r\n===================\r\n2) Report Timeline\r\n===================\r\n \r\n2016-05-15: S\u00e9bastien Morin of COSIG report the vulnerability to MSRC.\r\n2016-06-07: MSRC confirm the vulnerability\r\n2016-08-09: Microsoft fixed the issue (MS16-099).\r\n2016-08-09: Advisory released.\r\n \r\n#######################################################################################\r\n \r\n===================\r\n3) Technical details\r\n===================\r\n \r\nThis vulnerability allow remote code execution if a user opens a specially crafted Microsoft Office Word (.doc) with an invalid WordDocumentStream.\r\nAn attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.\r\n \r\n#######################################################################################\r\n \r\n==========\r\n4) POC\r\n==========\r\n \r\nhttps://smsecurity.net/wp-content/uploads/2016/08/COSIG-2016-31.doc\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40224.zip\r\n \r\n#######################################################################################\n\n# 0day.today [2018-04-04] #", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/25632"}], "exploitdb": [{"lastseen": "2016-08-10T23:40:38", "description": "Microsoft Office Word 2007,2010,2013,2016 - Out-of-Bounds Read Remote Code Execution (MS16-099). CVE-2016-3313. Dos exploit for Windows platform", "published": "2016-08-10T00:00:00", "type": "exploitdb", "title": "Microsoft Office Word 2007,2010,2013,2016 - Out-of-Bounds Read Remote Code Execution (MS16-099)", "bulletinFamily": "exploit", "cvelist": ["CVE-2016-3313"], "modified": "2016-08-10T00:00:00", "id": "EDB-ID:40224", "href": "https://www.exploit-db.com/exploits/40224/", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": ""}], "mscve": [{"lastseen": "2020-08-07T11:45:29", "bulletinFamily": "microsoft", "cvelist": ["CVE-2016-3313"], "description": "A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\n\nExploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.\n\nNote that the Preview Pane is not an attack vector for this vulnerability. The security update addresses the vulnerability by correcting how Office handles objects in memory.\n", "edition": 3, "modified": "2016-08-22T07:00:00", "id": "MS:CVE-2016-3313", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3313", "published": "2016-08-22T07:00:00", "title": "Microsoft Office Memory Corruption Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:34", "description": "\nMicrosoft Word 2007201020132016 - Out-of-Bounds Read Code Execution (MS16-099)", "edition": 1, "published": "2016-08-10T00:00:00", "title": "Microsoft Word 2007201020132016 - Out-of-Bounds Read Code Execution (MS16-099)", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2016-3313"], "modified": "2016-08-10T00:00:00", "id": "EXPLOITPACK:96765EF9C04BFA43671B5251B9680CD9", "href": "", "sourceData": "#####################################################################################\n\n# Application: Microsoft Office Word\n# Platforms: Windows, OSX\n# Versions: Microsoft Office Word 2007,2010,2013,2016\n# Author: S\u00e9bastien Morin of COSIG\n# Website: https://cosig.gouv.qc.ca/en/advisory/\n# Twitter: @SebMorin1, @COSIG_\n# Date: August 09, 2016\n# CVE: CVE-2016-3313\n# COSIG-2016-31\n\n#####################################################################################\n\n1) Introduction\n2) Report Timeline\n3) Technical details\n4) POC\n\n#######################################################################################\n\n===================\n1) Introduction\n===================\n\nMicrosoft Word is a word processor developed by Microsoft. It was first released on October 25, 1983[3] under the name Multi-Tool Word for Xenix systems.[4][5][6] Subsequent versions were later written for several other platforms including IBM PCs running DOS (1983), Apple Macintosh running Mac OS (1985), AT&T Unix PC (1985), Atari ST (1988), OS/2 (1989), Microsoft Windows (1989) and SCO Unix (1994). Commercial versions of Word are licensed as a standalone product or as a component of Microsoft Office, Windows RT or the discontinued Microsoft Works suite. Microsoft Word Viewer and Office Online are Freeware editions of Word with limited features.\n\n(https://en.wikipedia.org/wiki/Microsoft_Word)\n\n#######################################################################################\n\n===================\n2) Report Timeline\n===================\n\n2016-05-15: S\u00e9bastien Morin of COSIG report the vulnerability to MSRC.\n2016-06-07: MSRC confirm the vulnerability\n2016-08-09: Microsoft fixed the issue (MS16-099).\n2016-08-09: Advisory released.\n\n#######################################################################################\n\n===================\n3) Technical details\n===================\n\nThis vulnerability allow remote code execution if a user opens a specially crafted Microsoft Office Word (.doc) with an invalid WordDocumentStream.\nAn attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.\n\n#######################################################################################\n\n==========\n4) POC\n==========\n\nhttps://smsecurity.net/wp-content/uploads/2016/08/COSIG-2016-31.doc\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40224.zip\n\n#######################################################################################", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2020-06-10T19:46:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3313", "CVE-2016-3317"], "description": "This host is missing an important security\n update according to Microsoft Bulletin MS16-099.", "modified": "2020-06-08T00:00:00", "published": "2016-08-10T00:00:00", "id": "OPENVAS:1361412562310807870", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807870", "type": "openvas", "title": "Microsoft Office Word Viewer Multiple RCE Vulnerabilities (3177451)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Office Word Viewer Multiple RCE Vulnerabilities (3177451)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807870\");\n script_version(\"2020-06-08T14:40:48+0000\");\n script_cve_id(\"CVE-2016-3313\", \"CVE-2016-3317\");\n script_bugtraq_id(92289, 92303);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-08 14:40:48 +0000 (Mon, 08 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-08-10 09:57:09 +0530 (Wed, 10 Aug 2016)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Office Word Viewer Multiple RCE Vulnerabilities (3177451)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS16-099.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist as the office software\n fails to properly handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to run arbitrary code in the context of the current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Word Viewer 2007.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3115480\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3115479\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/MS16-099\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/WordView/Version\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nwordviewVer = get_kb_item(\"SMB/Office/WordView/Version\");\nwordviewPath = get_kb_item(\"SMB/Office/WordView/Install/Path\");\nif(!wordviewPath){\n wordviewPath = \"Unable to fetch the install path\";\n}\n\nif(wordviewVer)\n{\n if(version_in_range(version:wordviewVer, test_version:\"11.0\", test_version2:\"11.0.8431\"))\n {\n report = 'File checked: ' + wordviewPath + \"Wordview.exe\" + '\\n' +\n 'File version: ' + wordviewVer + '\\n' +\n 'Vulnerable range: 11.0 - 11.0.8431 \\n' ;\n security_message(data:report);\n exit(0);\n }\n}\n##File not available for KB:\n##https://support.microsoft.com/en-us/kb/3115479\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T13:58:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3313", "CVE-2016-3317", "CVE-2016-3318"], "description": "This host is missing an important security\n update according to Microsoft Bulletin MS16-099.", "modified": "2019-12-20T00:00:00", "published": "2016-08-10T00:00:00", "id": "OPENVAS:1361412562310807872", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807872", "type": "openvas", "title": "Microsoft Office Suite Remote Code Execution Vulnerabilities (3177451)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Office Suite Remote Code Execution Vulnerabilities (3177451)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807872\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2016-3313\", \"CVE-2016-3318\", \"CVE-2016-3317\");\n script_bugtraq_id(92289, 92308, 92303);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-08-10 11:22:55 +0530 (Wed, 10 Aug 2016)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Office Suite Remote Code Execution Vulnerabilities (3177451)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS16-099.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist as office software\n fails to properly handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to run arbitrary code in the context of the current user.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Office 2007 Service Pack 3\n\n - Microsoft Office 2010 Service Pack 2\n\n - Microsoft Office 2013 Service Pack 1\n\n - Microsoft Office 2016 Service Pack 1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3114442\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3114893\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3115415\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3114400\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3115468\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3114869\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3114340\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3115427\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/MS16-099\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"MS/Office/Ver\");\n script_require_ports(139, 445);\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\n## MS Office\noffVer = get_kb_item(\"MS/Office/Ver\");\nif(!offVer){\n exit(0);\n}\n\npath = registry_get_sz(key:\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\",\n item:\"CommonFilesDir\");\nif(!path){\n exit(0);\n}\n\n## Microsoft Office 2007\n## Microsoft Office 2010\n## Microsoft Office 2013\n## Microsoft Office 2016\nif(offVer =~ \"^(12|14)\\..*\")\n{\n filePath = path + \"\\Microsoft Shared\\GRPHFLT\";\n\n fileVer1 = fetch_file_version(sysPath:filePath, file_name:\"pictim32.flt\");\n if(fileVer1)\n {\n if(fileVer1 =~ \"^2006\")\n {\n if(version_in_range(version:fileVer1, test_version:\"2006\", test_version2:\"2006.1200.4518.1004\"))\n {\n VULN1 = TRUE;\n Vulnerable_range1 = \"2006 - 2006.1200.4518.1004\";\n }\n else if(version_in_range(version:fileVer1, test_version:\"2006.1200.6000\", test_version2:\"2006.1200.6753.4999\"))\n {\n VULN1 = TRUE;\n Vulnerable_range1 = \"2006.1200.6000 - 2006.1200.6753.4999\";\n }\n }\n\n else if(fileVer1 =~ \"^2010\")\n {\n if(version_in_range(version:fileVer1, test_version:\"2010\", test_version2:\"2010.1400.4740.0999\"))\n {\n VULN1 = TRUE;\n Vulnerable_range1 = \"2010 - 2010.1400.4740.0999\";\n }\n else if(version_in_range(version:fileVer1, test_version:\"2010.1400.7000\", test_version2:\"2010.1400.7006.0999\"))\n {\n VULN1 = TRUE;\n Vulnerable_range1 = \"2010.1400.7000 - 2010.1400.7006.0999\";\n }\n }\n }\n if(VULN1)\n {\n report = 'File checked: ' + filePath + \"\\pictim32.flt\" + '\\n' +\n 'File version: ' + fileVer1 + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range1 + '\\n' ;\n security_message(data:report);\n }\n}\n\nif(offVer =~ \"^15\\..*\")\n{\n filePath2 = path + \"\\Microsoft Shared\\TextConv\";\n\n fileVer2 = fetch_file_version(sysPath:filePath2, file_name:\"wpequ532.dll\");\n if(fileVer2 =~ \"^2012\")\n {\n if(version_in_range(version:fileVer2, test_version:\"2012\", test_version2:\"2012.1500.4454.0999\"))\n {\n report = 'File checked: ' + filePath2 + \"\\wpequ532.dll\" + '\\n' +\n 'File version: ' + fileVer2 + '\\n' +\n 'Vulnerable range: ' + \"2012 - 2012.1500.4454.0999\" + '\\n' ;\n security_message(data:report);\n }\n }\n}\n\n##https://support.microsoft.com/en-us/kb/3115468\n##File not available\n\nif(offVer =~ \"^(12|14|15|16)\\..*\")\n{\n foreach offsubver (make_list(\"Office12\", \"Office15\", \"Office14\", \"Office16\"))\n {\n offPath = path + \"\\Microsoft Shared\\\" + offsubver;\n offexeVer = fetch_file_version(sysPath:offPath, file_name:\"Mso.dll\");\n\n if(offexeVer)\n {\n if(offexeVer =~ \"^12\"){\n Vulnerable_range3 = \"12.0 - 12.0.6754.4999\";\n }\n else if(offexeVer =~ \"^14\"){\n Vulnerable_range3 = \"14 - 14.0.7172.4999\";\n }\n else if(offexeVer =~ \"^15\"){\n Vulnerable_range3 = \"15 - 15.0.4849.0999\";\n }\n else if(offexeVer =~ \"^16\"){\n Vulnerable_range3 = \"16 - 16.0.4417.0999\";\n }\n\n if(version_in_range(version:offexeVer, test_version:\"12.0\", test_version2:\"12.0.6754.4999\") ||\n version_in_range(version:offexeVer, test_version:\"14.0\", test_version2:\"14.0.7172.4999\") ||\n version_in_range(version:offexeVer, test_version:\"15.0\", test_version2:\"15.0.4849.0999\") ||\n version_in_range(version:offexeVer, test_version:\"16.0\", test_version2:\"16.0.4417.0999\"))\n {\n report = 'File checked: ' + offPath + \"\\Mso.dll\" + '\\n' +\n 'File version: ' + offexeVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range3 + '\\n' ;\n security_message(data:report);\n exit(0);\n }\n }\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T13:58:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3313", "CVE-2016-3316", "CVE-2016-3315", "CVE-2016-3317"], "description": "This host is missing an important security\n update according to Microsoft Bulletin MS16-099", "modified": "2019-12-20T00:00:00", "published": "2016-08-23T00:00:00", "id": "OPENVAS:1361412562310807881", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807881", "type": "openvas", "title": "Microsoft Office Multiple Vulnerabilities-3177451(Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Office Multiple Vulnerabilities-3177451(Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:microsoft:office\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807881\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2016-3317\", \"CVE-2016-3313\", \"CVE-2016-3315\", \"CVE-2016-3316\");\n script_bugtraq_id(92303, 92289, 92294, 92300);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-08-23 14:12:30 +0530 (Tue, 23 Aug 2016)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Office Multiple Vulnerabilities-3177451(Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS16-099\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist as,\n\n - Microsoft OneNote improperly discloses its memory contents.\n\n - Office software fails to properly handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to gain access to potentially sensitive information and run arbitrary\n code in the context of the current user.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Office 2011 on Mac OS X\n\n - Microsoft Office 2016 on Mac OS X\");\n\n script_tag(name:\"solution\", value:\"Apply the patch from the referenced advisory.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3179162\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3179163\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3177451\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/ms16-099.aspx\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gb_microsoft_office_detect_macosx.nasl\");\n script_mandatory_keys(\"MS/Office/MacOSX/Ver\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nif(!offVer = get_kb_item(\"MS/Office/MacOSX/Ver\")){\n exit(0);\n}\n\nif((!offVer =~ \"^(14\\.)\") || (!offVer =~ \"^(15\\.)\")){\n exit(0);\n}\n\nif(offVer =~ \"^(14\\.)\" && version_is_less(version:offVer, test_version:\"14.6.7\"))\n{\n report = 'File version: ' + offVer + '\\n' +\n 'Vulnerable range: 14.1.0 - 14.6.6' + '\\n' ;\n security_message(data:report);\n}\n\nif(offVer =~ \"^(15\\.)\" && version_is_less(version:offVer, test_version:\"15.25.0\"))\n{\n report = 'File version: ' + offVer + '\\n' +\n 'Vulnerable range: 15.0 - 15.24.0 ' + '\\n' ;\n security_message(data:report);\n exit(0);\n}\nexit(0);\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T05:43:51", "description": "The Microsoft Office application installed on the remote Windows host\nis missing a security update. It is, therefore, affected by multiple\nvulnerabilities :\n\n - Multiple memory corruption issues exist in Microsoft\n Office software due to improper handling of objects in\n memory. An unauthenticated, remote attacker can exploit\n these issues, by convincing a user to open a specially\n crafted file, to execute arbitrary code in the context\n of the current user. (CVE-2016-3313, CVE-2016-3316,\n CVE-2016-3317, CVE-2016-3318)\n\n - An information disclosure vulnerability exists in\n Microsoft OneNote due to an unspecified flaw. An\n unauthenticated, remote attacker can exploit this, by\n convincing a user to open a specially crafted OneNote\n file, to disclose sensitive memory contents.\n (CVE-2016-3315)", "edition": 28, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2016-08-10T00:00:00", "title": "MS16-099: Security Update for Microsoft Office (3177451)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3313", "CVE-2016-3316", "CVE-2016-3315", "CVE-2016-3317", "CVE-2016-3318"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:word", "cpe:/a:microsoft:word_viewer", "cpe:/a:microsoft:onenote", "cpe:/a:microsoft:outlook", "cpe:/a:microsoft:office"], "id": "SMB_NT_MS16-099.NASL", "href": "https://www.tenable.com/plugins/nessus/92839", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(92839);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/14\");\n\n script_cve_id(\n \"CVE-2016-3313\",\n \"CVE-2016-3315\",\n \"CVE-2016-3316\",\n \"CVE-2016-3317\",\n \"CVE-2016-3318\"\n );\n script_bugtraq_id(\n 92289,\n 92294,\n 92300,\n 92303,\n 92308\n );\n script_xref(name:\"MSFT\", value:\"MS16-099\");\n script_xref(name:\"MSKB\", value:\"3114340\");\n script_xref(name:\"MSKB\", value:\"3114400\");\n script_xref(name:\"MSKB\", value:\"3114442\");\n script_xref(name:\"MSKB\", value:\"3114456\");\n script_xref(name:\"MSKB\", value:\"3114869\");\n script_xref(name:\"MSKB\", value:\"3114885\");\n script_xref(name:\"MSKB\", value:\"3114893\");\n script_xref(name:\"MSKB\", value:\"3114981\");\n script_xref(name:\"MSKB\", value:\"3115256\");\n script_xref(name:\"MSKB\", value:\"3115415\");\n script_xref(name:\"MSKB\", value:\"3115419\");\n script_xref(name:\"MSKB\", value:\"3115427\");\n script_xref(name:\"MSKB\", value:\"3115439\");\n script_xref(name:\"MSKB\", value:\"3115440\");\n script_xref(name:\"MSKB\", value:\"3115449\");\n script_xref(name:\"MSKB\", value:\"3115452\");\n script_xref(name:\"MSKB\", value:\"3115465\");\n script_xref(name:\"MSKB\", value:\"3115468\");\n script_xref(name:\"MSKB\", value:\"3115471\");\n script_xref(name:\"MSKB\", value:\"3115474\");\n script_xref(name:\"MSKB\", value:\"3115479\");\n script_xref(name:\"MSKB\", value:\"3115480\");\n script_xref(name:\"IAVA\", value:\"2016-A-0203\");\n\n script_name(english:\"MS16-099: Security Update for Microsoft Office (3177451)\");\n script_summary(english:\"Checks the file versions.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"An application installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office application installed on the remote Windows host\nis missing a security update. It is, therefore, affected by multiple\nvulnerabilities :\n\n - Multiple memory corruption issues exist in Microsoft\n Office software due to improper handling of objects in\n memory. An unauthenticated, remote attacker can exploit\n these issues, by convincing a user to open a specially\n crafted file, to execute arbitrary code in the context\n of the current user. (CVE-2016-3313, CVE-2016-3316,\n CVE-2016-3317, CVE-2016-3318)\n\n - An information disclosure vulnerability exists in\n Microsoft OneNote due to an unspecified flaw. An\n unauthenticated, remote attacker can exploit this, by\n convincing a user to open a specially crafted OneNote\n file, to disclose sensitive memory contents.\n (CVE-2016-3315)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-099\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Microsoft Office 2007,\n2010, 2013, 2013 RT, and 2016; Microsoft Word 2007, 2010, 2013, 2013\nRT, and 2016; Microsoft OneNote 2007, 2010, 2013, 2013 RT, and 2016;\nMicrosoft Outlook 2007, 2010, 2013, and 2016; and Word Viewer.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-3318\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:onenote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word_viewer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:outlook\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nglobal_var bulletin, vuln;\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS16-099';\nkbs = make_list(\n '3114340', # Office 2013 SP1\n '3114400', # Office 2010 SP2\n '3114442', # Office 2007 SP3\n '3114456', # OneNote 2007 SP3\n '3114869', # Office 2010 SP2\n '3114885', # OneNote 2010 SP2\n '3114893', # Office 2007 SP3\n '3114981', # Outlook 2007 SP3\n '3115256', # OneNote 2013 SP1\n '3115415', # Office 2016\n '3115419', # OneNote 2016\n '3115427', # Office 2013 SP1\n '3115439', # Word 2016\n '3115440', # Outlook 2016\n '3115449', # Word 2013 SP1\n '3115452', # Outlook 2013 SP1\n '3115465', # Word 2007 SP3\n '3115468', # Office 2010 SP2\n '3115471', # Word 2010 SP2\n '3115474', # Outlook 2010 SP2\n '3115479', # Word Viewer\n '3115480' # Word Viewer\n);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\", exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, \"Failed to determine the location of %windir%.\");\n\nvuln = FALSE;\n\nfunction perform_office_checks()\n{\n local_var office_vers, office_sp, common_path, path, prod, kb;\n office_vers = hotfix_check_office_version();\n\n ######################################################################\n # Office 2007 Checks\n ######################################################################\n if (office_vers[\"12.0\"])\n {\n office_sp = get_kb_item(\"SMB/Office/2007/SP\");\n if (!isnull(office_sp) && office_sp == 3)\n {\n prod = \"Microsoft Office 2007 SP3\";\n common_path = hotfix_get_officecommonfilesdir(officever:\"12.0\");\n\n path = hotfix_append_path(path:common_path, value:\"\\Microsoft Shared\\GRPHFLT\");\n if (hotfix_check_fversion(file:\"epsimp32.flt\", version:\"2006.1200.6737.5000\", min_version:\"2006.1200.0.0\", path:path, bulletin:bulletin, kb:\"3114442\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n path = hotfix_append_path(path:common_path, value:\"Microsoft Shared\\Office12\");\n if (hotfix_check_fversion(file:\"mso.dll\", version:\"12.0.6754.5000\" , path:path, bulletin:bulletin, kb:\"3114893\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n }\n\n ######################################################################\n # Office 2010 Checks\n ######################################################################\n if (office_vers[\"14.0\"])\n {\n office_sp = get_kb_item(\"SMB/Office/2010/SP\");\n if (!isnull(office_sp) && office_sp == 2)\n {\n prod = \"Microsoft Office 2010 SP2\";\n common_path = hotfix_get_officecommonfilesdir(officever:\"14.0\");\n\n path = hotfix_append_path(path:common_path, value:\"\\Microsoft Shared\\GRPHFLT\");\n if (hotfix_check_fversion(file:\"epsimp32.flt\", version:\"2010.1400.7163.5000\", min_version:\"2010.1400.0.0\", path:path, bulletin:bulletin, kb:\"3114400\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n path = hotfix_append_path(path:common_path, value:\"Microsoft Shared\\Office14\");\n if (hotfix_check_fversion(file:\"mso.dll\", version:\"14.0.7172.5000\", path:path, bulletin:bulletin, kb:\"3114869\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n if ( \"64\" >< get_kb_item(\"SMB/Office/14.0/Bitness\"))\n {\n path = hotfix_append_path(path:hotfix_get_commonfilesdirx86(), value:\"Microsoft Shared\\Office14\");\n if (hotfix_check_fversion(file:\"mso.dll\", version:\"14.0.7172.5000\", path:path, bulletin:bulletin, kb:\"3114869\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n\n # wwlibcxm.dll only exists if KB2428677 is installed\n path = hotfix_append_path(path:hotfix_get_officeprogramfilesdir(officever:\"14.0\"), value:\"Microsoft Office\\Office14\");\n if (hotfix_check_fversion(file:\"wwlibcxm.dll\", version:\"14.0.7172.5000\", path:path, bulletin:bulletin, kb:\"3115468\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n }\n\n ######################################################################\n # Office 2013 Checks\n ######################################################################\n if (office_vers[\"15.0\"])\n {\n office_sp = get_kb_item(\"SMB/Office/2013/SP\");\n if (!isnull(office_sp) && int(office_sp) == 1)\n {\n prod = \"Microsoft Office 2013 SP1\";\n common_path = hotfix_get_officecommonfilesdir(officever:\"15.0\");\n\n path = hotfix_append_path(path:common_path, value:\"\\Microsoft Shared\\GRPHFLT\");\n if (hotfix_check_fversion(file:\"epsimp32.flt\", version:\"2012.1500.4775.1000\", min_version:\"2012.1500.0.0\", path:path, bulletin:bulletin, kb:\"3114340\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n path = hotfix_append_path(path:common_path, value:\"Microsoft Shared\\Office15\");\n if (hotfix_check_fversion(file:\"mso.dll\", version: \"15.0.4849.1000\", path:path, bulletin:bulletin, kb:\"3115427\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n if ( \"64\" >< get_kb_item(\"SMB/Office/15.0/Bitness\"))\n {\n path = hotfix_append_path(path:hotfix_get_commonfilesdirx86(), value:\"Microsoft Shared\\Office15\");\n if (hotfix_check_fversion(file:\"mso.dll\", version:\"15.0.4849.1000\", path:path, bulletin:bulletin, kb:\"3115427\", product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n }\n }\n\n ######################################################################\n # Office 2016 Checks\n ######################################################################\n if (office_vers[\"16.0\"])\n {\n office_sp = get_kb_item(\"SMB/Office/2016/SP\");\n if (!isnull(office_sp) && int(office_sp) == 0)\n {\n prod = \"Microsoft Office 2016\";\n path = hotfix_append_path(path:hotfix_get_officecommonfilesdir(officever:\"16.0\"), value:\"Microsoft Shared\\Office16\");\n if (\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.4417.1000\", channel:\"MSI\", channel_product:\"Office\", path:path, bulletin:bulletin, kb:\"3115415\", product:prod) == HCF_OLDER ||\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.6701.1036\", channel:\"Deferred\", channel_version:\"1602\", channel_product:\"Office\", path:path, bulletin:bulletin, kb:\"3115415\", product:prod) == HCF_OLDER ||\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.7127.1019\", channel:\"Current\", channel_product:\"Office\", path:path, bulletin:bulletin, kb:\"3115415\", product:prod) == HCF_OLDER\n )\n vuln = TRUE;\n\n if ( \"64\" >< get_kb_item(\"SMB/Office/16.0/Bitness\"))\n {\n path = hotfix_append_path(path:hotfix_get_officeprogramfilesdir(officever:\"16.0\"), value:\"Microsoft Office\\root\\VFS\\ProgramFilesCommonX86\\Microsoft Shared\\OFFICE16\");\n if (\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.4417.1000\", channel:\"MSI\", channel_product:\"Office\", path:path, bulletin:bulletin, kb:\"3115415\", product:prod) == HCF_OLDER ||\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.6701.1036\", channel:\"Deferred\", channel_version:\"1602\", channel_product:\"Office\", path:path, bulletin:bulletin, kb:\"3115415\", product:prod) == HCF_OLDER ||\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.7127.1019\", channel:\"Current\", channel_product:\"Office\", path:path, bulletin:bulletin, kb:\"3115415\", product:prod) == HCF_OLDER\n )\n vuln = TRUE;\n }\n }\n }\n}\n\nfunction perform_office_product_checks()\n{\n local_var word_checks, onenote_checks, outlook_checks, word_vwr_checks;\n\n local_var installs, install, path; # For DLL checks\n\n ######################################################################\n # Word Checks\n ######################################################################\n word_checks = make_array(\n \"12.0\", make_array(\"sp\", 3, \"version\", \"12.0.6754.5000\", \"kb\", \"3115465\"),\n \"14.0\", make_array(\"sp\", 2, \"version\", \"14.0.7172.5000\", \"kb\", \"3115471\"),\n \"15.0\", make_array(\"sp\", 1, \"version\", \"15.0.4849.1000\", \"kb\", \"3115449\"),\n \"16.0\", make_nested_list(\n make_array(\"sp\", 0, \"version\", \"16.0.4417.1000\", \"channel\", \"MSI\", \"kb\", \"3115439\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6001.1087\", \"channel\", \"Deferred\", \"kb\", \"3115439\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6741.2063\", \"channel\", \"Deferred\", \"channel_version\", \"1602\", \"kb\", \"3115439\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6965.2076\", \"channel\", \"First Release for Deferred\", \"kb\", \"3115439\"),\n make_array(\"sp\", 0, \"version\", \"16.0.7167.2036\", \"channel\", \"Current\", \"kb\", \"3115439\")\n )\n );\n if (hotfix_check_office_product(product:\"Word\", checks:word_checks, bulletin:bulletin))\n vuln = TRUE;\n\n ######################################################################\n # OneNote Checks\n ######################################################################\n onenote_checks = make_array(\n \"12.0\", make_array(\"sp\", 3, \"version\", \"12.0.6735.5000\", \"kb\", \"3114456\"),\n \"14.0\", make_array(\"sp\", 2, \"version\", \"14.0.7162.5000\", \"kb\", \"3114885\"),\n \"15.0\", make_array(\"sp\", 1, \"version\", \"15.0.4831.1000\", \"kb\", \"3115256\"),\n \"16.0\", make_nested_list(\n make_array(\"sp\", 0, \"version\", \"16.0.4405.1000\", \"channel\", \"MSI\", \"kb\", \"3115419\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6001.1087\", \"channel\", \"Deferred\", \"kb\", \"3115419\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6741.2063\", \"channel\", \"Deferred\", \"channel_version\", \"1602\", \"kb\", \"3115419\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6965.2076\", \"channel\", \"First Release for Deferred\", \"kb\", \"3115419\"),\n make_array(\"sp\", 0, \"version\", \"16.0.7167.2036\", \"channel\", \"Current\", \"kb\", \"3115419\")\n )\n );\n if (hotfix_check_office_product(product:\"OneNote\", checks:onenote_checks, bulletin:bulletin))\n vuln = TRUE;\n\n ######################################################################\n # Outlook Checks\n ######################################################################\n outlook_checks = make_array(\n \"12.0\", make_array(\"sp\", 3, \"version\", \"12.0.6753.5000\", \"kb\", \"3114981\"),\n \"14.0\", make_array(\"sp\", 2, \"version\", \"14.0.7172.5000\", \"kb\", \"3115474\"),\n \"15.0\", make_array(\"sp\", 1, \"version\", \"15.0.4849.1000\", \"kb\", \"3115452\"),\n \"16.0\", make_nested_list(\n make_array(\"sp\", 0, \"version\", \"16.0.4417.1000\", \"channel\", \"MSI\", \"kb\", \"3115440\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6001.1087\", \"channel\", \"Deferred\", \"kb\", \"3115440\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6741.2063\", \"channel\", \"Deferred\", \"channel_version\", \"1602\", \"kb\", \"3115440\"),\n make_array(\"sp\", 0, \"version\", \"16.0.6965.2076\", \"channel\", \"First Release for Deferred\", \"kb\", \"3115440\"),\n make_array(\"sp\", 0, \"version\", \"16.0.7167.2036\", \"channel\", \"Current\", \"kb\", \"3115440\")\n )\n );\n if (hotfix_check_office_product(product:\"Outlook\", checks:outlook_checks, bulletin:bulletin))\n vuln = TRUE;\n\n ######################################################################\n # Word Viewer\n ######################################################################\n installs = get_kb_list(\"SMB/Office/WordViewer/*/ProductPath\");\n if (!isnull(installs))\n {\n word_vwr_checks = make_array(\n \"11.0\", make_array(\"version\", \"11.0.8433.0\", \"kb\", \"3115480\")\n );\n if (hotfix_check_office_product(product:\"WordViewer\", display_name:\"Word Viewer\", checks:word_vwr_checks, bulletin:bulletin))\n vuln = TRUE;\n\n foreach install (keys(installs))\n {\n path = installs[install];\n path = ereg_replace(pattern:'^(.+)\\\\\\\\[^\\\\\\\\]+\\\\.exe$', replace:\"\\1\\\", string:path, icase:TRUE);\n if(hotfix_check_fversion(path:path, file:\"mso.dll\", version:\"11.0.8433.0\", kb:\"3115479\", bulletin:bulletin, min_version:\"11.0.0.0\", product:\"Microsoft Word Viewer\") == HCF_OLDER)\n vuln = TRUE;\n }\n }\n}\n\nperform_office_checks();\nperform_office_product_checks();\n\nif (vuln)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-01-01T22:48:58", "bulletinFamily": "microsoft", "cvelist": ["CVE-2016-3313", "CVE-2016-3316", "CVE-2016-3315", "CVE-2016-3317", "CVE-2016-3318"], "description": "<html><body><p>Describes a security update that fixes vulnerabilities in Microsoft Office. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.</p><h2>Summary</h2><div class=\"kb-summary-section section\">This security update resolves a vulnerability in Microsoft Office. To learn more about the vulnerability, see <a href=\"https://technet.microsoft.com/library/security/ms16-099\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS16-099</a>.<span></span><br/></div><h2>More information about this security update</h2><div class=\"kb-moreinformation-section section\">The following articles contain more information about this security update as it relates to individual product versions. These articles may contain known issue information.<br/>\u00a0<ul class=\"sbody-free_list\"><li><a href=\"https://support.microsoft.com/help/3115474\" id=\"kb-link-3\" target=\"_self\">KB3115474 MS16-099: Description of the security update for Outlook 2010: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115427\" id=\"kb-link-4\" target=\"_self\">KB3115427 MS16-099: Description of the security update for Office 2013: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115449\" id=\"kb-link-5\" target=\"_self\">KB3115449 MS16-099: Description of the security update for Word 2013: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115452\" id=\"kb-link-6\" target=\"_self\">KB3115452 MS16-099: Description of the security update for Outlook 2013: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115415\" id=\"kb-link-7\" target=\"_self\">KB3115415 MS16-099: Description of the security update for Office 2016: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115440\" id=\"kb-link-8\" target=\"_self\">KB3115440 MS16-099: Description of the security update for Outlook 2016: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115439\" id=\"kb-link-9\" target=\"_self\">KB3115439 MS16-099: Description of the security update for Word 2016: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115419\" id=\"kb-link-10\" target=\"_self\">KB3115419 MS16-099: Description of the security update for OneNote 2016: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115256\" id=\"kb-link-11\" target=\"_self\">KB3115256 MS16-099: Description of the security update for OneNote 2013: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114340\" id=\"kb-link-12\" target=\"_self\">KB3114340 MS16-099: Description of the security update for Office 2013: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115471\" id=\"kb-link-13\" target=\"_self\">KB3115471 MS16-099: Description of the security update for Word 2010: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114885\" id=\"kb-link-14\" target=\"_self\">KB3114885 MS16-099: Description of the security update for OneNote 2010: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114869\" id=\"kb-link-15\" target=\"_self\">KB3114869 MS16-099: Description of the security update for Office 2010: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115468\" id=\"kb-link-16\" target=\"_self\">KB3115468 MS16-099: Description of the security update for Office 2010: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114400\" id=\"kb-link-17\" target=\"_self\">KB3114400 MS16-099: Description of the security update for Office 2010: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115465\" id=\"kb-link-18\" target=\"_self\">KB3115465 MS16-099: MS16-054: Description of the security update for Word 2007: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114981\" id=\"kb-link-19\" target=\"_self\">KB3114981 MS16-099: Description of the security update for Outlook 2007: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114456\" id=\"kb-link-20\" target=\"_self\">KB3114456 MS16-099: Description of the security update for OneNote 2007: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114893\" id=\"kb-link-21\" target=\"_self\">KB3114893 MS16-099: MS16-054: Description of the security update for 2007 Microsoft Office Suite: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3114442\" id=\"kb-link-22\" target=\"_self\">KB3114442 MS16-099: Description of the security update for 2007 Microsoft Office Suite: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115480\" id=\"kb-link-23\" target=\"_self\">KB3115480 MS16-099: MS16-054: Description of the security update for Word Viewer: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3115479\" id=\"kb-link-24\" target=\"_self\">KB3115479 MS16-099: MS16-054: Description of the security update for Word Viewer: August 9, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3179163\" id=\"kb-link-25\" target=\"_self\">KB3179163 MS16-099: Description of the security update for Office 2016 for Mac: August 22, 2016</a></li><li><a href=\"https://support.microsoft.com/help/3179162\" id=\"kb-link-26\" target=\"_self\">KB3179162 MS16-099: Description of the security update for Office for Mac 2011 14.6.7: August 22, 2016</a></li></ul><h3 class=\"sbody-h3\">Nonsecurity-related fixes and improvements that are included in this security update</h3><ul class=\"sbody-free_list\"><li>Add OST corruption events.</li><li>Translates some terms in multiple languages to make sure that the meaning is accurate.</li><li>Update the requirement set to the current version for Web Add-ins in Outlook 2016.</li><li>Contains fixes for the following nonsecurity issues:<br/><br/>\u00a0<ul class=\"sbody-free_list\"><li>Attachments are rearranged, deleted, duplicated, or corrupted.</li><li>When you try to download attachments in an IRM protected email message offline in Outlook 2013, you receive the following error message:<div class=\"indent\"><div class=\"sbody-error\">Sorry, something went wrong opening Information Rights Management protected content. The network location cannot be reached.</div></div>This issue occurs after you install <a href=\"https://support.microsoft.com/help/3054941\" id=\"kb-link-27\" target=\"_self\">October 13, 2015, update for Office 2013 (KB3054941)</a>.</li><li>Administrator can use the Group Policy to block running any macro in the files that are download from the Internet in Office 2013 applications. This feature is same as in Office 2016 applications. See the following articles for more information:<div class=\"indent\"><a href=\"https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection/\" id=\"kb-link-28\" target=\"_self\">New feature in Office 2016 can block macros and help prevent infection</a></div><div class=\"indent\"><a href=\"https://technet.microsoft.com/en-us/library/ee857085%28v=office.16%29.aspx#blockvba\" id=\"kb-link-29\" target=\"_self\">Plan security settings for VBA macros in Office 2016</a></div></li><li>When you try to print a document in the envelope paper size and the landscape orientation in Word 2013, the printing is blocked and the document is set as the letter page size in the spooler file.</li><li>The track changes bar may not appear in the correct position in Word 2013.</li><li>Assume that you preview a Word document in the preview pane in Windows Explorer. When you print a document that contains comments in Word 2013 during this time, the comments are not printed.</li><li>It takes a long time to run a macro to implement some revisions in Word 2013.</li><li>Assume that you formatted text as right-to-left in Word 2010 using the built-in RtlRun macro, and that this text contains text in Latin characters. When you open the document in Word 2013, the text is displayed with the letters in reverse order. For example, \"txeT\" instead of \"Text.\"</li><li>Recipients on email sent programmatically in Outlook 2013 aren't added to the users nickname cache. Therefore, when you manually try to send another email message to the same recipients, you won't get any suggestion for those recipients' names. This update enables users to turn on the ability for recipients to be added to the nickname cache when email message is sent programmatically. See <a href=\"https://support.microsoft.com/help/3115397\" id=\"kb-link-30\" target=\"_self\">KB3115397</a> for more information.</li><li>When you create an email message by using an Outlook template (.oft) in online mode in Outlook 2013, German of French extended characters aren't displayed correctly and garbled characters are displayed.</li><li>When you paste a mailto link that has an embedded hyperlink in an email message in Outlook 2013, the hyperlink isn't clickable.</li><li>When you drag-and-drop a folder (C) between two other folders\u202f (A, B) which have sub-folders, folder C will be nested into folder A as a subfolder instead of being inserted between A and B at their same level.</li><li>When you mark a task as completed in Outlook 2013, you receive the following error message:<div class=\"indent\"><div class=\"sbody-error\">We need to know who to send this to. Make sure you enter at least one name.</div></div>This issue occurs after you install <a href=\"https://support.microsoft.com/help/3114349\" id=\"kb-link-31\" target=\"_self\">December 8, 2015, update for Outlook 2013 (KB3114349)</a>.</li><li>If Outlook 2013 crashes after you send an email message while the email message is still in the Outbox folder, the email message is lost and can't be found.</li><li>After failing an initial logon, a subsequent retry may cause the following message to be incorrectly displayed:<div class=\"indent\"><div class=\"sbody-error\">The Microsoft Exchange administrator has made a change that requires you quit and restart Outlook.</div></div></li><li>Assume that you add a second Exchange account to an existing profile in Outlook 2013 while it's running, and select a different sync slider setting. After you restart Outlook 2013, the sync slider setting of the new account is reset to the default.</li><li>Folders may disappear from the favorites list in Outlook 2013. This issue occurs if you implement the <strong class=\"uiterm\">DisableCrossAccountCopy</strong> policy.</li><li>After the MAPI over HTTP transport protocol is disabled for some Exchange topologies, some online archive mailbox can't be opened any longer in Outlook 2013.</li><li>In an ADAL authentication enabled environment, you can't create a profile for Outlook 2013 through Control Panel.</li><li>After you enable the <span class=\"text-base\">I am currently giving a presentation</span> option in the <span class=\"text-base\">Presentation Settings </span>dialog box, Outlook 2013 will not be able to authenticate and will enter a <span class=\"text-base\">Need Password </span>state.</li><li>You can't open Mail in Control Panel if you have Outlook 2013 Click-to-Run installed.</li><li>Assume that you have a Project .mpp file that's stored in a SharePoint document library. When you click the file name, the project opens but you don't see a banner that offers you the ability to edit or check out the project. Instead, the project may keep in a read-only state and you can't save or check in changes.</li><li>When you try to reply or forward an email message that contains a linked image, Outlook 2016 freezes before the image is displayed.</li><li>Some unnecessary network traffic occurs during AutoDiscover in Outlook 2016.</li><li>When you mark a task as completed in Outlook 2016, you receive the following error message:<div class=\"indent\"><div class=\"sbody-error\">We need to know who to send this to. Make sure you enter at least one name.</div></div></li><li>When you use a .prf file to set an IMAP profile in Outlook 2016, authentication dialog box isn't displayed. Therefore, emails can't be synchronized and you can't send email messages.</li><li>When you paste a mailto link that has an embedded hyperlink in an email message in Outlook 2016, the hyperlink isn't clickable.</li><li>When you create an email message by using an Outlook template (.oft) in online mode in Outlook 2016, German of French extended characters aren't displayed correctly and garbled characters are displayed.</li><li>When you send digitally signed email messages in a 64-bit version of Outlook 2016, you receive the following error message:<div class=\"indent\"><div class=\"sbody-error\">A required action was not successful because of an unspecified error.</div></div></li><li>You can't use Outlook 2016 to connect online archive and shared mailbox in different sites in Exchange Server 2010.</li><li>Even though the Cached Mode Group Policy Object (GPO) forces cache mode for an account, the cached account still displays an online data file location.</li><li>Assume that you add a second Exchange account to an existing profile in Outlook 2016 while it's running, and select a different sync slider setting. After you restart Outlook 2016, the sync slider setting of the new account is reset to the default.</li><li>If Outlook 2016 crashes after you send an email message while the email message is still in the Outbox folder, the email message is lost and can't be found.</li><li>After you enable the <span class=\"text-base\">I am currently giving a presentation </span>option in the <span class=\"text-base\">Presentation Settings </span>dialog box, Outlook 2016 will not be able to authenticate and will enter a <span class=\"text-base\">Need Password </span>state.</li><li>If you open two documents that have the same macro name but different VBProject names in Word 2016, the <span class=\"text-base\">MacroButton </span>field stops working.</li><li>When you convert a document that has basic line shapes that have different line widths to a PDF or XPS file in Word 2016, the basic line shapes are displayed as having the same width.</li><li>When you try to reply or forward an email message that contains a linked image, Outlook 2016 freezes before the image is displayed.</li><li>It takes a long time to run a macro to implement some revisions in Word 2016.</li></ul></li></ul></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Microsoft Office 2007 (all editions) and Other Software</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Microsoft Office 2007 Service Pack 3:<br/><span class=\"text-base\">convloc2007-kb3114442-fullfile-x86-glb.exe</span><span class=\"text-base\"><br/><span class=\"text-base\">mso2007-kb3114893-fullfile-x86-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2007 Service Pack 3:<br/><span class=\"text-base\">word2007-kb3115465-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2007 Service Pack 3:<br/><span class=\"text-base\">onenote2007-kb3114456-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word Viewer:<br/><span class=\"text-base\">office-kb3115479-fullfile-enu.exe</span><span class=\"text-base\"><br/><span class=\"text-base\">office-kb3115480-fullfile-enu.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/912203\" id=\"kb-link-33\" target=\"_self\">Microsoft Knowledge Base Article 912203</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. <br/><br/>To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see <a href=\"https://support.microsoft.com/help/887012\" id=\"kb-link-34\" target=\"_self\">Microsoft Knowledge Base Article 887012</a>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Use the <span class=\"sbody-userinput\">Add or Remove Programs </span>item in <span class=\"sbody-userinput\">Control Panel</span>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3114442\" id=\"kb-link-35\" target=\"_self\">Microsoft Knowledge Base Article 3114442</a><br/>See <a href=\"https://support.microsoft.com/help/3114893\" id=\"kb-link-36\" target=\"_self\">Microsoft Knowledge Base Article 3114893</a><br/>See <a href=\"https://support.microsoft.com/help/3115465\" id=\"kb-link-37\" target=\"_self\">Microsoft Knowledge Base Article 3115465</a><br/>See <a href=\"https://support.microsoft.com/help/3114456\" id=\"kb-link-38\" target=\"_self\">Microsoft Knowledge Base Article 3114456</a><br/>See <a href=\"https://support.microsoft.com/help/3115479\" id=\"kb-link-39\" target=\"_self\">Microsoft Knowledge Base Article 3115479</a><br/>See <a href=\"https://support.microsoft.com/help/3115480\" id=\"kb-link-40\" target=\"_self\">Microsoft Knowledge Base Article 3115480</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">Not applicable</td></tr></table></div><h4 class=\"sbody-h4\">Microsoft Office 2010 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Microsoft Office 2010 Service Pack 2 (32-bit editions):<span class=\"text-base\"><br/><span class=\"text-base\">convloc2010-kb3114400-fullfile-x86-glb.exe</span><br/><span class=\"text-base\">mso2010-kb3114869-fullfile-x86-glb.exe</span><br/><span class=\"text-base\">kb24286772010-kb3115468-fullfile-x86-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Office 2010 Service Pack 2 (64-bit editions) <br/><span class=\"text-base\">convloc2010-kb3114400-fullfile-x64-glb.exe</span><span class=\"text-base\"><br/><span class=\"text-base\">mso2010-kb3114869-fullfile-x64-glb.exe</span><br/><span class=\"text-base\">kb24286772010-kb3115468-fullfile-x64-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2010 Service Pack 2 (32-bit editions):<br/><span class=\"text-base\">onenoteloc2010-kb3114885-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2010 Service Pack 2 (64-bit editions):<br/><span class=\"text-base\">onenoteloc2010-kb3114885-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2010 Service Pack 2 (32-bit editions):<span class=\"text-base\"><br/><span class=\"text-base\">word2010-kb3115471-fullfile-x86-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2010 Service Pack 2 (64-bit editions) <br/><span class=\"text-base\">word2010-kb3115471-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/912203\" id=\"kb-link-41\" target=\"_self\">Microsoft Knowledge Base Article 912203</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement </span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. <br/><br/>To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see <a href=\"https://support.microsoft.com/help/887012\" id=\"kb-link-42\" target=\"_self\">Microsoft Knowledge Base Article 887012</a>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Use the <span class=\"sbody-userinput\">Add or Remove Programs </span>item in<span class=\"sbody-userinput\"> Control Panel</span>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3114400\" id=\"kb-link-43\" target=\"_self\">Microsoft Knowledge Base Article 3114400</a><br/>See <a href=\"https://support.microsoft.com/help/3114869\" id=\"kb-link-44\" target=\"_self\">Microsoft Knowledge Base Article 3114869</a><br/>See <a href=\"https://support.microsoft.com/help/3115468\" id=\"kb-link-45\" target=\"_self\">Microsoft Knowledge Base Article 3115468</a><br/>See <a href=\"https://support.microsoft.com/help/3114885\" id=\"kb-link-46\" target=\"_self\">Microsoft Knowledge Base Article 3114885</a><br/>See <a href=\"https://support.microsoft.com/help/3115471\" id=\"kb-link-47\" target=\"_self\">Microsoft Knowledge Base Article 3115471</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">Not applicable</td></tr></table></div><h4 class=\"sbody-h4\">Microsoft Office 2013 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Microsoft Office 2013 Service Pack 1 (32-bit editions)<br/><span class=\"text-base\">conv2013-kb3114340-fullfile-x86-glb.exe</span><span class=\"text-base\"><br/><span class=\"text-base\">mso2013-kb3115427-fullfile-x86-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Office 2013 Service Pack 1 (64-bit editions)<br/><span class=\"text-base\">conv2013-kb3114340-fullfile-x64-glb.exe</span><span class=\"text-base\"><br/><span class=\"text-base\">mso2013-kb3115427-fullfile-x64-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2013 Service Pack 1 (32-bit editions)<br/><span class=\"text-base\">onenote2013-kb3115256-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2013Service Pack 1 (64-bit editions)<br/><span class=\"text-base\">onenote2013-kb3115256-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2013 Service Pack 1 (32-bit editions):<span class=\"text-base\"><br/><span class=\"text-base\">word2013-kb3115449-fullfile-x86-glb.exe</span></span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2013 Service Pack 1 (64-bit editions) <br/><span class=\"text-base\">word2013-kb3115449-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/912203\" id=\"kb-link-48\" target=\"_self\">Microsoft Knowledge Base Article 912203</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. <br/><br/>To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see <a href=\"https://support.microsoft.com/help/887012\" id=\"kb-link-49\" target=\"_self\">Microsoft Knowledge Base Article 887012</a>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Use the <span class=\"sbody-userinput\">Add or Remove Programs </span>item in<span class=\"sbody-userinput\"> Control Panel</span>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3114340\" id=\"kb-link-50\" target=\"_self\">Microsoft Knowledge Base Article 3114340</a><br/>See <a href=\"https://support.microsoft.com/help/3115427\" id=\"kb-link-51\" target=\"_self\">Microsoft Knowledge Base Article 3115427</a><br/>See <a href=\"https://support.microsoft.com/help/3115256\" id=\"kb-link-52\" target=\"_self\">Microsoft Knowledge Base Article 3115256</a><br/>See <a href=\"https://support.microsoft.com/help/3115449\" id=\"kb-link-53\" target=\"_self\">Microsoft Knowledge Base Article 3115449</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">Not applicable</td></tr></table></div><h4 class=\"sbody-h4\">Microsoft Office 2013 RT (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">The 3114340, 3115427, 3115256, and 3115449 updates for Microsoft Office 2013 RT and its components are available via <a href=\"http://go.microsoft.com/fwlink/?linkid=21130\" id=\"kb-link-54\" target=\"_self\">Windows Update</a>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. <br/><br/>To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see <a href=\"https://support.microsoft.com/help/887012\" id=\"kb-link-55\" target=\"_self\">Microsoft Knowledge Base Article 887012</a>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Click <strong class=\"uiterm\">Control Panel</strong>, click <strong class=\"uiterm\">System and Security</strong>, and then click <strong class=\"uiterm\">Windows Update</strong>. Under <span class=\"sbody-userinput\">See also</span>, click <span class=\"sbody-userinput\">Installed updates</span>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3114340\" id=\"kb-link-56\" target=\"_self\">Microsoft Knowledge Base Article 3114340</a><br/>See <a href=\"https://support.microsoft.com/help/3115427\" id=\"kb-link-57\" target=\"_self\">Microsoft Knowledge Base Article 3115427</a><br/>See <a href=\"https://support.microsoft.com/help/3115256\" id=\"kb-link-58\" target=\"_self\">Microsoft Knowledge Base Article 3115256</a><br/>See <a href=\"https://support.microsoft.com/help/3115449\" id=\"kb-link-59\" target=\"_self\">Microsoft Knowledge Base Article 3115449</a></td></tr></table></div><h4 class=\"sbody-h4\">Microsoft Office 2016 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Microsoft Office 2016 (32-bit edition)<br/><span class=\"text-base\">mso2016-kb3115415-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Office 2016 (64-bit edition)<br/><span class=\"text-base\">mso2016-kb3115415-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2016(32-bit editions)<br/><span class=\"text-base\">onenote2016-kb3115419-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft OneNote 2016 (64-bit editions)<br/><span class=\"text-base\">onenote2016-kb3115419-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2016 (32-bit edition):<br/><span class=\"text-base\">word2016-kb3115439-fullfile-x86-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Microsoft Word 2016 (64-bit edition):<br/><span class=\"text-base\">word2016-kb3115439-fullfile-x64-glb.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/912203\" id=\"kb-link-60\" target=\"_self\">Microsoft Knowledge Base Article 912203</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. <br/><br/>To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see <a href=\"https://support.microsoft.com/help/887012\" id=\"kb-link-61\" target=\"_self\">Microsoft Knowledge Base Article 887012</a>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Use the <span class=\"sbody-userinput\">Add or Remove Programs\u00a0</span>item in<span class=\"sbody-userinput\"> Control Panel</span>. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3115415\" id=\"kb-link-62\" target=\"_self\">Microsoft Knowledge Base Article 3115415</a><br/>See <a href=\"https://support.microsoft.com/help/3115419\" id=\"kb-link-63\" target=\"_self\">Microsoft Knowledge Base Article 3115419</a><br/>See <a href=\"https://support.microsoft.com/help/3115439\" id=\"kb-link-64\" target=\"_self\">Microsoft Knowledge Base Article 3115439</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">Not applicable</td></tr></table></div><h4 class=\"sbody-h4\">Office for Mac 2011</h4><span class=\"text-base\">Prerequisites</span><br/><br/><ul class=\"sbody-free_list\"><li>Mac OS X version 10.5.8 or later version on an Intel processor</li><li>Mac OS X user accounts must have administrator privileges to install this security update</li></ul><span class=\"text-base\">Installing the Update</span><br/><br/>Download and install the appropriate language version of the Microsoft Office for Mac 2011 14.6.7 Update from the <a href=\"http://www.microsoft.com/download/details.aspx?familyid=465a2dca-d446-47a0-a3b6-ccaad921cb73\" id=\"kb-link-65\" target=\"_self\">Microsoft Download Center</a>.<br/><br/><ol class=\"sbody-num_list\"><li>Exit\u00a0any applications that are running, including virus-protection applications and all Microsoft Office applications, because they could interfere with the installation.\u00a0</li><li>Open the Microsoft Office for Mac 2011 14.6.7. Update volume on your desktop. This step might have been performed for you. </li><li>To start the update process, in the Microsoft Office for Mac 2011 14.6.7 update volume window, double-click the Microsoft Office for Mac 2011 update application, and then follow the instructions on the screen.\u00a0</li><li>When the installation finishes successfully, you can remove the update installer from your hard disk. To verify that the installation finished successfully, see <span class=\"text-base\">Verifying Update Installation</span>. To remove the update installer, first drag the Microsoft Office for Mac 2011 14.6.7 update volume to the Trash, and then drag the file that you downloaded to the Trash.\u00a0</li></ol><span class=\"text-base\">Verifying update installation</span><br/><br/>To verify that a security update is installed on an affected system, follow these steps:<br/><br/><ol class=\"sbody-num_list\"><li>In <span class=\"text-base\">Finder</span>, navigate to the <span class=\"text-base\">Application Folder</span> (Microsoft Office 2011). </li><li>Select <span class=\"text-base\">Word</span>, <span class=\"text-base\">Excel</span>, <span class=\"text-base\">PowerPoint</span> or <span class=\"text-base\">Outlook</span>, and then start the application.\u00a0</li><li>On the <span class=\"sbody-userinput\">Application</span> menu, click <strong class=\"sbody-strong\">About Application_Name</strong> (where <strong class=\"sbody-strong\">About Application_Name</strong> is Word, Excel, PowerPoint or Outlook). </li></ol>If the<strong class=\"uiterm\"> Latest Installed Update Versio</strong>n number is 14.6.7, the update has been successfully installed. <br/><br/><span class=\"text-base\">Restart Requirement</span><br/><br/>This update does not require you to restart your computer. <br/><br/><span class=\"text-base\">Removing the Update</span><br/><br/>This security update cannot be uninstalled. <br/><br/><span class=\"text-base\">Additional Information</span><br/><br/>If you have technical questions or problems downloading or using this update, see <a href=\"https://www.microsoft.com/mac/support\" id=\"kb-link-66\" target=\"_self\">Microsoft for Mac Support</a> to learn about the support options that are available to you.<br/><h4 class=\"sbody-h4\">Office 2016 for Mac</h4><span class=\"text-base\">Prerequisites</span><br/><br/><ul class=\"sbody-free_list\"><li>Mac OS X Yosemite 10.10 or later version on an Intel processor</li><li>A valid Microsoft Office 365 subscription</li></ul><span class=\"text-base\">Installing the Update</span><br/><br/>Download and install the appropriate language version of the Microsoft Office 2016 for Mac 15.25.0 update from\u00a0<a href=\"https://support.microsoft.com/help/3179163\" id=\"kb-link-67\" target=\"_self\">KB3179163</a>.<br/><br/><ol class=\"sbody-num_list\"><li>Exit\u00a0any applications that are running, including virus-protection applications and all Microsoft Office applications, because they could interfere with the installation.\u00a0</li><li>Open the Microsoft Office 2016 for Mac 15.25.0 update volume on your desktop. This step might have been performed for you.\u00a0</li><li>To start the update process, in the Microsoft Office 2016 for Mac 15.25.0, update volume window, double-click the Microsoft Office 2016 for Mac 15.25.0\u00a0update application, and then follow the instructions on the screen.\u00a0</li><li>When the installation finishes successfully, you can remove the update installer from your hard disk. To verify that the installation finished successfully, see <span class=\"text-base\">Verifying Update Installation</span>. To remove the update installer, first drag the Microsoft Office 2016 for Mac 15.25.0 update volume to the Trash, and then drag the file that you downloaded to the Trash.\u00a0</li></ol><span class=\"text-base\">Verifying Update Installation</span><br/><br/>To verify that a security update is installed on an affected system, follow these steps:<br/><br/><ol class=\"sbody-num_list\"><li>In <span class=\"text-base\">Finder</span>, navigate to the <span class=\"text-base\">Application Folder</span> (Microsoft Office 2016). </li><li>Select <span class=\"text-base\">Word</span>, <span class=\"text-base\">Excel</span>, <span class=\"text-base\">PowerPoint</span> or <span class=\"text-base\">Outlook</span>\u00a0and then start the application.\u00a0</li><li>On the <span class=\"sbody-userinput\">Application</span> menu, click <strong class=\"sbody-strong\">About Application_Name</strong> (where <strong class=\"sbody-strong\">About Application_Name</strong> is Word, Excel, PowerPoint or Outlook). </li></ol>If the<strong class=\"uiterm\"> Latest Installed Update Versio</strong>n number is 15.25.0, the update has been successfully installed. <br/><br/><span class=\"text-base\">Restart Requirement</span><br/><br/>This update does not require you to restart your computer. <br/><br/><span class=\"text-base\">Removing the Update</span><br/><br/>This security update cannot be uninstalled.<br/><br/><br/></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to get help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-68\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-69\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-70\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"\" id=\"kb-link-71\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 3, "modified": "2020-04-16T07:08:02", "id": "KB3177451", "href": "https://support.microsoft.com/en-us/help/3177451/", "published": "2016-08-09T00:00:00", "title": "MS16-099: Security update for Microsoft Office: August 9, 2016", "type": "mskb", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T12:04:24", "bulletinFamily": "info", "cvelist": ["CVE-2016-3313", "CVE-2016-3316", "CVE-2016-3315", "CVE-2016-3303", "CVE-2016-3317", "CVE-2016-3304", "CVE-2016-3301", "CVE-2016-3318"], "description": "### *Detect date*:\n08/09/2016\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information or execute arbitrary code.\n\n### *Affected products*:\nMicrosoft Office 2007 Service Pack 3 \nMicrosoft Office 2010 Service Pack 2 \nMicrosoft Office 2013 Service Pack 1 \nMicrosoft Office 2013 RT Service Pack 1 \nMicrosoft Office 2016 \nMicrosoft Office for Mac 2011 \nMicrosoft Office 2016 for Mac \nMicrosoft Outlook 2007 Service Pack 3 \nMicrosoft Outlook 2010 Service Pack 2 \nMicrosoft Outlook 2013 Service Pack 1 \nMicrosoft Outlook 2016 \nMicrosoft Word Viewer\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[ADV160011](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV160011>) \n[CVE-2016-3304](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3304>) \n[CVE-2016-3303](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3303>) \n[CVE-2016-3301](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3301>) \n[CVE-2016-3318](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3318>) \n[CVE-2016-3317](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3317>) \n[CVE-2016-3316](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3316>) \n[CVE-2016-3315](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3315>) \n[CVE-2016-3313](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3313>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>)\n\n### *CVE-IDS*:\n[CVE-2016-3304](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3304>)0.0Unknown \n[CVE-2016-3303](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3303>)0.0Unknown \n[CVE-2016-3301](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3301>)0.0Unknown \n[CVE-2016-3318](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3318>)9.3Critical \n[CVE-2016-3317](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3317>)9.3Critical \n[CVE-2016-3316](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3316>)9.3Critical \n[CVE-2016-3315](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3315>)4.3Warning \n[CVE-2016-3313](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3313>)9.3Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[3115479](<http://support.microsoft.com/kb/3115479>) \n[3114893](<http://support.microsoft.com/kb/3114893>) \n[3115480](<http://support.microsoft.com/kb/3115480>) \n[3115465](<http://support.microsoft.com/kb/3115465>) \n[3115439](<http://support.microsoft.com/kb/3115439>) \n[3115415](<http://support.microsoft.com/kb/3115415>) \n[3114981](<http://support.microsoft.com/kb/3114981>) \n[3114456](<http://support.microsoft.com/kb/3114456>) \n[3115474](<http://support.microsoft.com/kb/3115474>) \n[3115419](<http://support.microsoft.com/kb/3115419>) \n[3115471](<http://support.microsoft.com/kb/3115471>) \n[3115452](<http://support.microsoft.com/kb/3115452>) \n[3114885](<http://support.microsoft.com/kb/3114885>) \n[3115427](<http://support.microsoft.com/kb/3115427>) \n[3114400](<http://support.microsoft.com/kb/3114400>) \n[3114340](<http://support.microsoft.com/kb/3114340>) \n[3115449](<http://support.microsoft.com/kb/3115449>) \n[3179163](<http://support.microsoft.com/kb/3179163>) \n[3115468](<http://support.microsoft.com/kb/3115468>) \n[3115440](<http://support.microsoft.com/kb/3115440>) \n[3115256](<http://support.microsoft.com/kb/3115256>) \n[3114442](<http://support.microsoft.com/kb/3114442>) \n[3114869](<http://support.microsoft.com/kb/3114869>) \n[3179162](<http://support.microsoft.com/kb/3179162>) \n[3115408](<http://support.microsoft.com/kb/3115408>) \n[3115481](<http://support.microsoft.com/kb/3115481>) \n[3174305](<http://support.microsoft.com/kb/3174305>) \n[3115131](<http://support.microsoft.com/kb/3115131>) \n[3174304](<http://support.microsoft.com/kb/3174304>) \n[3174301](<http://support.microsoft.com/kb/3174301>) \n[3115109](<http://support.microsoft.com/kb/3115109>) \n[3115431](<http://support.microsoft.com/kb/3115431>) \n[3174302](<http://support.microsoft.com/kb/3174302>)\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 44, "modified": "2020-06-18T00:00:00", "published": "2016-08-09T00:00:00", "id": "KLA10857", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10857", "title": "\r KLA10857Multiple vulnerabilities in Microsoft Office ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}