This host is missing an important security update according to Microsoft KB4484287. Multiple flaws exist due to errors in Microsoft Access handling objects in memory, which can allow attackers to obtain sensitive information and compromise the user's system
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
![]() | Description of the security update for Office 2013: April 14, 2020 | 14 Apr 202007:00 | – | mskb |
![]() | Description of the security update for Office 2016: April 14, 2020 | 14 Apr 202007:00 | – | mskb |
![]() | Description of the security update for Office 2010: April 14, 2020 | 14 Apr 202007:00 | – | mskb |
![]() | Microsoft Office 2013 Service Pack 1 Multiple Vulnerabilities (KB4484229) | 15 Apr 202000:00 | – | openvas |
![]() | Microsoft Office 365 (2016 Click-to-Run) Multiple Vulnerabilities (Apr 2020) | 15 Apr 202000:00 | – | openvas |
![]() | Microsoft Office Remote Code Execution Vulnerability | 14 Apr 202007:00 | – | mscve |
![]() | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability | 14 Apr 202007:00 | – | mscve |
![]() | CVE-2020-0961 | 15 Apr 202015:13 | – | cvelist |
![]() | CVE-2020-0760 | 15 Apr 202015:12 | – | cvelist |
![]() | CVE-2020-0991 | 15 Apr 202015:13 | – | cvelist |
Source | Link |
---|---|
support | www.support.microsoft.com/en-us/help/4484287 |
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.816875");
script_version("2021-08-12T06:00:50+0000");
script_cve_id("CVE-2020-0961", "CVE-2020-0991");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2021-08-12 06:00:50 +0000 (Thu, 12 Aug 2021)");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-04-17 19:14:00 +0000 (Fri, 17 Apr 2020)");
script_tag(name:"creation_date", value:"2020-04-15 14:06:49 +0530 (Wed, 15 Apr 2020)");
script_name("Microsoft Office 2016 Multiple Vulnerabilities (KB4484287)");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft KB4484287");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to multiple errors in
Microsoft Access because it fails to properly handle objects in memory.");
script_tag(name:"impact", value:"Successful exploitation will allow an attacker
to obtain sensitive information and further compromise the user's system.");
script_tag(name:"affected", value:"Microsoft Office 2016.");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4484287");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
script_family("Windows : Microsoft Bulletins");
script_dependencies("secpod_office_products_version_900032.nasl");
script_mandatory_keys("MS/Office/Ver");
script_require_ports(139, 445);
exit(0);
}
include("smb_nt.inc");
include("host_details.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
officeVer = get_kb_item("MS/Office/Ver");
if(!officeVer|| officeVer !~ "^16\."){
exit(0);
}
os_arch = get_kb_item("SMB/Windows/Arch");
if("x86" >< os_arch){
key_list = make_list("SOFTWARE\Microsoft\Windows\CurrentVersion");
}
else if("x64" >< os_arch){
key_list = make_list("SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion",
"SOFTWARE\Microsoft\Windows\CurrentVersion");
}
foreach key(key_list)
{
propath = registry_get_sz(key:key, item:"ProgramFilesDir");
if(propath)
{
offPath = propath + "\Microsoft Office\root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16";
offdllVer = fetch_file_version(sysPath:offPath, file_name:"acecore.dll");
if(!offdllVer|| offdllVer !~ "^16\."){
exit(0);
}
if(version_is_less(version:offdllVer, test_version:"16.0.4993.1000"))
{
report = report_fixed_ver( file_checked:offPath + "\acecore.dll",
file_version:offdllVer, vulnerable_range:"16.0 - 16.0.4993.0999");
security_message(data:report);
exit(0);
}
}
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo