Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.812729
Kategorie:Mac OS X Local Security Checks
Titel:Microsoft Office Multiple Remote Code Execution Vulnerabilities (Jan 2018) - Mac OS X
Zusammenfassung:This host is missing an important security; update for Microsoft Office 2016 on Mac OS X according to Microsoft security; update January 2018
Beschreibung:Summary:
This host is missing an important security
update for Microsoft Office 2016 on Mac OS X according to Microsoft security
update January 2018

Vulnerability Insight:
Multiple flaws are due to:

- Microsoft office software fails to properly handle objects in memory.

- Microsoft outlook improperly parses specially crafted email messages.

Vulnerability Impact:
Successful exploitation will allow attackers
to run arbitrary code in the context of the current user. If the current user
is logged on with administrative user rights, an attacker could take control
of the affected system.

Affected Software/OS:
Microsoft Office 2016 on Mac OS X.

Solution:
Upgrade to Microsoft Office 2016 version
16.9.0 (Build 18011602) or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-0792
BugTraq ID: 102381
http://www.securityfocus.com/bid/102381
http://www.securitytracker.com/id/1040153
Common Vulnerability Exposure (CVE) ID: CVE-2018-0794
BugTraq ID: 102373
http://www.securityfocus.com/bid/102373
Common Vulnerability Exposure (CVE) ID: CVE-2018-0793
BugTraq ID: 102375
http://www.securityfocus.com/bid/102375
http://www.securitytracker.com/id/1040154
Common Vulnerability Exposure (CVE) ID: CVE-2018-0819
BugTraq ID: 102464
http://www.securityfocus.com/bid/102464
CopyrightCopyright (C) 2018 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.