The Microsoft Office application installed on the remote macOS or Mac OS X host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
Multiple remote code execution vulnerabilities exist due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit these by convincing a user to visit a specially crafted website or open a specially crafted Office file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2016-7213, CVE-2016-7228, CVE-2016-7229, CVE-2016-7231, CVE-2016-7232, CVE-2016-7234, CVE-2016-7235, CVE-2016-7236)
An information disclosure vulnerability exists due to an out-of-bounds read error caused by an uninitialized variable. An unauthenticated, remote attacker can exploit this by convincing a user to open a specially crafted Office file, resulting in the disclosure of memory contents. (CVE-2016-7233)
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(94913);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/02/17");
script_cve_id(
"CVE-2016-7213",
"CVE-2016-7228",
"CVE-2016-7229",
"CVE-2016-7231",
"CVE-2016-7232",
"CVE-2016-7233",
"CVE-2016-7234",
"CVE-2016-7235",
"CVE-2016-7236"
);
script_bugtraq_id(
93993,
93994,
93995,
93996,
94005,
94020,
94022,
94025,
94031
);
script_xref(name:"MSFT", value:"MS16-133");
script_xref(name:"IAVA", value:"2016-A-0319-S");
script_xref(name:"MSKB", value:"3198798");
script_xref(name:"MSKB", value:"3198807");
script_name(english:"MS16-133: Security Update for Microsoft Office (3199168) (macOS)");
script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote macOS or Mac OS X host is
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The Microsoft Office application installed on the remote macOS or Mac
OS X host is missing a security update. It is, therefore, affected by
multiple vulnerabilities :
- Multiple remote code execution vulnerabilities exist
due to improper handling of objects in memory. An
unauthenticated, remote attacker can exploit these by
convincing a user to visit a specially crafted website
or open a specially crafted Office file, resulting in
the execution of arbitrary code in the context of the
current user. (CVE-2016-7213, CVE-2016-7228,
CVE-2016-7229, CVE-2016-7231, CVE-2016-7232,
CVE-2016-7234, CVE-2016-7235, CVE-2016-7236)
- An information disclosure vulnerability exists due to an
out-of-bounds read error caused by an uninitialized
variable. An unauthenticated, remote attacker can exploit
this by convincing a user to open a specially crafted
Office file, resulting in the disclosure of memory
contents. (CVE-2016-7233)");
script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/MS16-133");
script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Microsoft Office for Mac
2011, Microsoft Office 2016 for Mac, Microsoft Excel for Mac 2011,
Microsoft Excel 2016 for Mac, Microsoft Word for Mac 2011, and
Microsoft Word 2016 for Mac.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/11/08");
script_set_attribute(attribute:"patch_publication_date", value:"2016/11/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/11/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word_for_mac");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:excel_for_mac");
script_set_attribute(attribute:"stig_severity", value:"II");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2016-2023 Tenable Network Security, Inc.");
script_dependencies("macosx_office_installed.nbin");
script_require_keys("Host/MacOSX/Version");
script_require_ports("installed_sw/Office for Mac 2011", "installed_sw/Microsoft Outlook", "installed_sw/Microsoft Excel", "installed_sw/Microsoft Word", "installed_sw/Microsoft PowerPoint", "installed_sw/Microsoft OneNote");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");
os = get_kb_item("Host/MacOSX/Version");
if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
# Office 2011
apps = make_list(
"Office for Mac 2011",
"Microsoft Outlook",
"Microsoft Excel",
"Microsoft Word",
"Microsoft PowerPoint",
"Microsoft OneNote"
);
report = "";
foreach app (apps)
{
installs = get_installs(app_name:app);
if (isnull(installs[1])) continue;
foreach install (installs[1])
{
version = install['version'];
path = install['path'];
app_label = app;
if (version =~ "^14\.")
{
if (app !~ " for Mac 2011$") app_label += " for Mac 2011";
fix = '14.7.0';
}
else
{
if (version =~ "^15\.") app_label += " for Mac 2016";
fix = '15.28.16111300';
}
if (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
{
report +=
'\n Product : ' + app_label +
'\n Installed version : ' + version +
'\n Fixed version : ' + fix;
os = get_kb_item("Host/MacOSX/Version");
if (os =~ "^Mac OS X 10\.[0-9](\.|$)" && app_label =~ " for Mac 2016$")
report += '\n Note : Update will require Mac OS X 10.10.0 or later.\n';
else report += '\n';
}
}
}
# Report findings.
if (!empty(report))
{
if (report_verbosity > 0) security_hole(port:0, extra:report);
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | office | cpe:/a:microsoft:office | |
microsoft | word_for_mac | cpe:/a:microsoft:word_for_mac | |
microsoft | excel_for_mac | cpe:/a:microsoft:excel_for_mac |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7232
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7233
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7234
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7235
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7236
technet.microsoft.com/library/security/MS16-133