
====================================================================

                             CERT-Renater

                  Note d'Information No. 2012/VULN274
____________________________________________________________________

DATE                :  11/07/2012

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S):  Mac OS X running
                       Microsoft Office for Mac version 2011.

======================================================================
KB2721015
http://technet.microsoft.com/en-us/security/bulletin/MS12-051
______________________________________________________________________

Microsoft Security Bulletin MS12-051 - Important Vulnerability in
Microsoft Office for Mac Could Allow Elevation of Privilege (2721015)

Published Date: July 10, 2012

Version: 1.0

General Information

Executive Summary

This security update resolves one publicly disclosed vulnerability in
Microsoft Office for Mac. The vulnerability could allow elevation of
privilege if a malicious executable is placed on an affected system by
an attacker, and then another user logs on later and runs the malicious
executable. An attacker must have valid logon credentials and be able to
log on locally to exploit this vulnerability.

This security update is rated Important for Microsoft Office for Mac
2011. For more information, see the subsection, Affected and
Non-Affected Software, in this section.

Affected Software

Microsoft Office for Mac 2011

Vulnerability Information

Office for Mac Improper Folder Permissions Vulnerability - CVE-2012-1894

An elevation of privilege vulnerability exists in the way that folder
permissions are set in certain Microsoft Office for Mac installations.
An attacker could place a malicious executable in the Microsoft Office
2011 folder. If a user later logs on and runs the malicious executable,
attacker-provided code can be made to execute in the security context of
the current user. If the user runs the malicious executable as an
administrator, the attacker could take complete control over an affected
system. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights. The attacker would
only be able to gain elevated privileges on the affected Mac computer if
a user executed the malicious executable. This is not a direct elevation
of privilege, but rather it is a luring attack.

======================================================================

=========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
=========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44          +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
+ 75013 Paris           | email: certsvp@renater.fr     +
=========================================================
