Lucene search

K

MS16-148: Security Update for Microsoft Office (3204068) (macOS)

The Microsoft Office application on macOS is missing a security update, leading to multiple vulnerabilities including information disclosure, remote code execution, arbitrary command execution, and elevation of privilege

Show more
Related
Refs
Code
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(95810);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/02/17");

  script_cve_id(
    "CVE-2016-7257",
    "CVE-2016-7263",
    "CVE-2016-7264",
    "CVE-2016-7266",
    "CVE-2016-7268",
    "CVE-2016-7276",
    "CVE-2016-7290",
    "CVE-2016-7291",
    "CVE-2016-7298",
    "CVE-2016-7300"
  );
  script_bugtraq_id(
    94662,
    94668,
    94670,
    94671,
    94672,
    94720,
    94755,
    94769,
    94784
  );
  script_xref(name:"MSFT", value:"MS16-148");
  script_xref(name:"IAVA", value:"2016-A-0345-S");
  script_xref(name:"MSKB", value:"3198800");
  script_xref(name:"MSKB", value:"3198808");

  script_name(english:"MS16-148: Security Update for Microsoft Office (3204068) (macOS)");

  script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote macOS or Mac OS X host is
affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The Microsoft Office application installed on the remote macOS or Mac
OS X host is missing a security update. It is, therefore, affected by
multiple vulnerabilities :

  - An information disclosure vulnerability exists in the
    Graphics Device Interface (GDI) component due to
    improper handling of objects in memory. A local attacker
    can exploit this, via a specially crafted application,
    to circumvent the Address Space Layout Randomization
    (ASLR) feature and disclose sensitive memory
    information. (CVE-2016-7257)

  - Multiple remote code execution vulnerabilities exist in
    Microsoft Office software due to a failure to properly
    handle objects in memory. An unauthenticated, remote
    attacker can exploit these vulnerabilities by convincing
    a user to open a specially crafted Office file,
    resulting in the execution of arbitrary code in the
    context of the current user. (CVE-2016-7263,
    CVE-2016-7298)

  - Multiple information disclosure vulnerabilities exist in
    Microsoft Office software due to an out-of-bounds memory
    read error. An unauthenticated, remote attacker can
    exploit these vulnerabilities by convincing a user to
    open a specially crafted Office file, resulting in the
    disclosure of memory contents. (CVE-2016-7264,
    CVE-2016-7268, CVE-2016-7276, CVE-2016-7290,
    CVE-2016-7291)

  - An arbitrary command execution vulnerability exists in
    Microsoft Office due to improper validation of registry
    settings when running embedded content. An
    unauthenticated, remote attacker can exploit this by
    convincing a user to open a specially crafted document
    file multiple times, resulting in a bypass of security
    restrictions and the execution of arbitrary commands.
    (CVE-2016-7266)

  - An elevation of privilege vulnerability exists in the
    Microsoft AutoUpdate (MAU) application due to improper
    validation of updates. A local attacker can exploit this
    by placing a specially crafted application in a location
    used by the update application, resulting in the ability
    to execute arbitrary code in a privileged context.
    (CVE-2016-7300)");
  script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/MS16-148");
  script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Microsoft Office for Mac
2011, Microsoft Office 2016 for Mac, Microsoft Excel for Mac 2011,
Microsoft Excel 2016 for Mac, Microsoft Word for Mac 2011, Microsoft
Word 2016 for Mac, and Microsoft Auto Updater for Mac.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-7298");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/12/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/12/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/12/14");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word_for_mac");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:excel_for_mac");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:auto_updater_for_mac");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("macosx_office_installed.nbin");
  script_require_keys("Host/MacOSX/Version");
  script_require_ports("installed_sw/Office for Mac 2011", "installed_sw/Microsoft Outlook", "installed_sw/Microsoft Excel", "installed_sw/Microsoft Word", "installed_sw/Microsoft PowerPoint", "installed_sw/Microsoft OneNote");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

os = get_kb_item("Host/MacOSX/Version");
if (!os) audit(AUDIT_OS_NOT, "Mac OS X");

# Office 2011
apps = make_list(
  "Office for Mac 2011",
  "Microsoft Outlook",
  "Microsoft Excel",
  "Microsoft Word",
  "Microsoft PowerPoint",
  "Microsoft OneNote"
);

report = "";

foreach app (apps)
{
  installs = get_installs(app_name:app);
  if (isnull(installs[1])) continue;
  foreach install (installs[1])
  {
    version = install['version'];
    path    = install['path'];
    app_label = app;
    if (version =~ "^14\.")
    {
      if (app !~ " for Mac 2011$") app_label += " for Mac 2011";
      fix = '14.7.1';
    }
    else
    {
      if (version =~ "^15\.") app_label += " for Mac 2016";
      fix = '15.29';
      fix_disp = '15.29 (161209)';
    }

    if (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
    {
      report +=
        '\n  Product           : ' + app_label +
        '\n  Installed version : ' + version;

      if (!empty_or_null(fix_disp))
      {
        report += '\n  Fixed version     : ' + fix_disp;
        fix_disp = '';
      }
      else report += '\n  Fixed version     : ' + fix;

      os = get_kb_item("Host/MacOSX/Version");

      if (os =~ "^Mac OS X 10\.[0-9](\.|$)" && app_label =~ " for Mac 2016$")
        report += '\n  Note              : Update will require Mac OS X 10.10.0 or later.\n';
      else report += '\n';
    }
  }
}

# Report findings.
if (!empty(report))
{
  if (report_verbosity > 0) security_hole(port:0, extra:report);
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 Dec 2016 00:00Current
8.2High risk
Vulners AI Score8.2
CVSS29.3
CVSS37.8
EPSS0.742
100
.json
Report