logo
DATABASE RESOURCES PRICING ABOUT US

KLA11976 Multiple vulnerabilites in Microsoft Office

Description

### *Detect date*: 10/13/2020 ### *Severity*: Critical ### *Description*: Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions. ### *Exploitation*: Malware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>). ### *Affected products*: Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft SharePoint Server 2019 Microsoft Office 2016 (32-bit edition) Microsoft Office 2013 RT Service Pack 1 3D Viewer Microsoft Office 2016 (64-bit edition) Microsoft Word 2013 Service Pack 1 (32-bit editions) Microsoft SharePoint Foundation 2010 Service Pack 2 Microsoft Word 2013 Service Pack 1 (64-bit editions) Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions Microsoft Office Web Apps 2010 Service Pack 2 Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2010 Service Pack 2 (64-bit editions) Microsoft Outlook 2010 Service Pack 2 (64-bit editions) Microsoft Word 2010 Service Pack 2 (32-bit editions) Microsoft Outlook 2013 RT Service Pack 1 Microsoft Word 2013 RT Service Pack 1 Microsoft Outlook 2013 Service Pack 1 (64-bit editions) Microsoft Office Online Server Microsoft Word 2016 (32-bit edition) Microsoft Excel 2010 Service Pack 2 (32-bit editions) Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft Outlook 2016 (32-bit edition) Microsoft Word 2010 Service Pack 2 (64-bit editions) Microsoft Outlook 2013 Service Pack 1 (32-bit editions) Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel Web App 2010 Service Pack 2 Microsoft Excel 2016 (32-bit edition) Microsoft Word 2016 (64-bit edition) Microsoft SharePoint Server 2010 Service Pack 2 Microsoft SharePoint Enterprise Server 2016 Microsoft Excel 2016 (64-bit edition) Microsoft Outlook 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office Web Apps 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office 2016 for Mac Microsoft Outlook 2010 Service Pack 2 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions ### *Solution*: Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) ### *Original advisories*: [CVE-2020-16928](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16928>) [CVE-2020-16929](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16929>) [CVE-2020-16941](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16941>) [CVE-2020-16946](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16946>) [CVE-2020-16947](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16947>) [CVE-2020-16944](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16944>) [CVE-2020-16945](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16945>) [CVE-2020-16948](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16948>) [CVE-2020-16949](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16949>) [CVE-2020-16942](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16942>) [CVE-2020-16932](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16932>) [CVE-2020-16952](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16952>) [CVE-2020-16955](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16955>) [CVE-2020-16954](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16954>) [CVE-2020-16951](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16951>) [CVE-2020-16950](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16950>) [CVE-2020-16953](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16953>) [CVE-2020-16934](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16934>) [CVE-2020-16933](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16933>) [CVE-2020-16918](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16918>) [CVE-2020-16957](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16957>) [CVE-2020-16930](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16930>) [CVE-2020-16931](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16931>) ### *Impacts*: ACE ### *Related products*: [Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>) ### *CVE-IDS*: [CVE-2020-16918](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16918>)9.3Critical [CVE-2020-16928](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16928>)6.8High [CVE-2020-16929](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16929>)6.8High [CVE-2020-16941](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16941>)2.1Warning [CVE-2020-16946](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16946>)3.5Warning [CVE-2020-16947](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16947>)9.3Critical [CVE-2020-16944](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16944>)3.5Warning [CVE-2020-16945](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16945>)3.5Warning [CVE-2020-16948](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16948>)4.0Warning [CVE-2020-16949](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16949>)5.0Critical [CVE-2020-16942](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16942>)2.1Warning [CVE-2020-16932](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16932>)6.8High [CVE-2020-16952](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16952>)6.8High [CVE-2020-16955](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16955>)6.8High [CVE-2020-16954](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16954>)6.8High [CVE-2020-16951](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16951>)6.8High [CVE-2020-16950](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16950>)4.3Warning [CVE-2020-16953](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16953>)4.0Warning [CVE-2020-16934](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16934>)6.8High [CVE-2020-16933](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16933>)6.8High [CVE-2020-16957](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16957>)9.3Critical [CVE-2020-16930](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16930>)6.8High [CVE-2020-16931](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16931>)6.8High ### *KB list*: [4486682](<http://support.microsoft.com/kb/4486682>) [4486678](<http://support.microsoft.com/kb/4486678>) [4484417](<http://support.microsoft.com/kb/4484417>) [4486676](<http://support.microsoft.com/kb/4486676>) [4486694](<http://support.microsoft.com/kb/4486694>) [4486707](<http://support.microsoft.com/kb/4486707>) [4486701](<http://support.microsoft.com/kb/4486701>) [4486687](<http://support.microsoft.com/kb/4486687>) [4486708](<http://support.microsoft.com/kb/4486708>) [4486677](<http://support.microsoft.com/kb/4486677>) [4486674](<http://support.microsoft.com/kb/4486674>) [4486688](<http://support.microsoft.com/kb/4486688>) [4484524](<http://support.microsoft.com/kb/4484524>) [4486663](<http://support.microsoft.com/kb/4486663>) [4486689](<http://support.microsoft.com/kb/4486689>) [4484531](<http://support.microsoft.com/kb/4484531>) [4486700](<http://support.microsoft.com/kb/4486700>) [4486679](<http://support.microsoft.com/kb/4486679>) [4486695](<http://support.microsoft.com/kb/4486695>) [4486703](<http://support.microsoft.com/kb/4486703>) [4484435](<http://support.microsoft.com/kb/4484435>) [4486692](<http://support.microsoft.com/kb/4486692>) [4462175](<http://support.microsoft.com/kb/4462175>) [4486671](<http://support.microsoft.com/kb/4486671>)


Related