Security Updates for Microsoft Office Products (February 2020) (macOS)

high Nessus Plugin ID 133650

Synopsis

An application installed on the remote macOS or Mac OS X host is affected by a remote code execution vulnerability

Description

The Microsoft Office application installed on the remote macOS or Mac OS X host is missing a security update. It is, therefore, affected by a remote code execution vulnerability due to Microsoft Excel improperly handling objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. To exploit the vulnerability, an attacker has to entice the logged on user to click a link or open a specially crafted file to gain control of the system with the privileges of the logged on user.

Solution

Microsoft has released a set of patches for Microsoft Office for Mac.

See Also

http://www.nessus.org/u?43ed1b90

http://www.nessus.org/u?dae26676

Plugin Details

Severity: High

ID: 133650

File Name: macos_ms20_feb_office.nasl

Version: 1.5

Type: local

Agent: macosx

Published: 2/12/2020

Updated: 3/13/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-0759

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/a:microsoft:office, cpe:/a:microsoft:excel, cpe:/a:microsoft:word, cpe:/a:microsoft:powerpoint, cpe:/a:microsoft:outlook

Required KB Items: Host/MacOSX/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 1/14/2020

Vulnerability Publication Date: 1/14/2020

Reference Information

CVE: CVE-2020-0759