
====================================================================

                           CERT-Renater

               Note d'Information No. 2015/VULN072
_____________________________________________________________________

DATE                : 13/05/2015

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Microsoft Office versions 2007,
                           2010, 2013, for Mac 2011,
                      Microsoft PowerPoint Viewer,
                      Microsoft SharePoint Server version 2010, 2013,
                      Microsoft Office Web Apps version 2010,
                      Microsoft Office Web Apps Server version 2013,
                     Microsoft SharePoint Foundation version 2010, 2013.

======================================================================
KB3057181
https://technet.microsoft.com/en-us/library/security/MS15-046
______________________________________________________________________

MS15-046 - Vulnerabilities in Microsoft Office Could Allow Remote Code
Execution - Important (3057181)

Bulletin Number: MS15-046

Bulletin Title: Vulnerabilities in Microsoft Office Could Allow Remote
Code Execution

Severity: Important

KB Article: 3057181

Version: 1.0

Published Date: May 12, 2015

Executive Summary

This security update resolves vulnerabilities in Microsoft Office. The
most severe of the vulnerabilities could allow remote code execution if
a user opens a specially crafted Microsoft Office file. An attacker who
successfully exploited the vulnerabilities could run arbitrary code in
the context of the current user. Customers whose accounts are
configured to have fewer user rights on the system could be less
impacted than those who operate with administrative user rights.


Affected Software

Microsoft Office 2007 Service Pack 3

Microsoft Office 2010 Service Pack 2 (32-bit editions)

Microsoft Office 2010 Service Pack 2 (64-bit editions)

Microsoft Office 2013 Service Pack 1 (32-bit editions)

Microsoft Office 2013 Service Pack 1 (64-bit editions)

Microsoft Office 2013 RT Service Pack 1

Microsoft Office for Mac 2011

Microsoft PowerPoint Viewer

Microsoft SharePoint Server 2010 Service Pack 2

Microsoft SharePoint Server 2013 Service Pack 1

Microsoft Office Web Apps 2010 Service Pack 2

Microsoft Office Web Apps Server 2013 Service Pack 1[2]

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Server 2010 Service Pack 2

Microsoft SharePoint Server 2013 Service Pack 1


Vulnerability Information

Multiple Microsoft Office Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist in Microsoft Office
software when the Office software fails to properly handle objects in
memory.

Exploitation of these vulnerabilities requires that a user open a
specially crafted file with an affected version of Microsoft Office
software. In an
email attack scenario an attacker could exploit the vulnerabilities by
sending the specially crafted file to the user and convincing the user
to open the file. In a web-based attack scenario an attacker could host
a website (or leverage a compromised website that accepts or hosts
user-provided content) that contains a specially crafted file that is
designed to exploit the vulnerabilities. An attacker would have no way
to force users to visit the website. Instead, an attacker would have to
convince users to click the link, typically by way of an enticement in
an email or Instant Messenger message.

An attacker who successfully exploited these vulnerabilities could run
arbitrary code in the context of the current user. If the current user
is logged on with administrative user rights, an attacker could take
complete control of the affected system. An attacker could then install
programs; view, change, or delete data; or create new accounts with
full user rights. Users whose accounts are configured to have fewer
user rights on the system could be less impacted than users who operate
with administrative user rights.

The security update addresses the vulnerabilities by correcting how
Microsoft Office parses specially crafted files.

Microsoft received information about the vulnerabilities through
coordinated vulnerability disclosure. When this security bulletin was
issued, Microsoft had not received any information to indicate that
these vulnerabilities had been publicly used to attack customers.

The following tables contain links to the standard entry for each
vulnerability in the Common Vulnerabilities and Exposures list:


Vulnerability title 					CVE number

Microsoft Office Memory Corruption Vulnerability 	CVE-2015-1682

Microsoft Office Memory Corruption Vulnerability 	CVE-2015-1683


=========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================
