Lucene search

K
srcinciteSteven Seeley of Source InciteSRC-2016-0043
HistorySep 21, 2016 - 12:00 a.m.

SRC-2016-0043 : Microsoft Office Word Array Indexing Out-Of-Bounds Read Information Disclosure Vulnerability

2016-09-2100:00:00
Steven Seeley of Source Incite
srcincite.io
10

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

0.008 Low

EPSS

Percentile

81.5%

Vulnerability Details:

This vulnerability allows remote attackers to disclose information on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within processing of a document file. A specially crafted doc file will lead to a read beyond the end of a heap buffer due to improper index calculation for array access before a copy operation. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

Affected Vendors:

Microsoft

Affected Products:

Office Word

  • Microsoft Word 2007 Service Pack 3
  • Microsoft Office 2010 Service Pack 2 (32-bit editions)
  • Microsoft Office 2010 Service Pack 2 (64-bit editions)
  • Microsoft Office Compatibility Pack Service Pack 3
  • Microsoft Word for Mac 2011
  • Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
  • Microsoft Office Web Apps 2010 Service Pack 2
    Vendor Response:

Microsoft has issued an update to correct this vulnerability. More details can be found at: <https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7291&gt;

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

0.008 Low

EPSS

Percentile

81.5%