Vulnerabilities > CVE-2011-1983 - Resource Management Errors vulnerability in Microsoft Office 2007/2010/2011

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
CWE-399
critical
nessus

Summary

Use-after-free vulnerability in Microsoft Office 2007 SP2 and SP3, Office 2010 Gold and SP1, and Office for Mac 2011 allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Use After Free Vulnerability."

Vulnerable Configurations

Part Description Count
Application
Microsoft
7

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS11-089
bulletin_url
date2011-12-13T00:00:00
impactRemote Code Execution
knowledgebase_id2590602
knowledgebase_url
severityImportant
titleVulnerability in Microsoft Office Could Allow Remote Code Execution

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_MS_OFFICE_DEC2011.NASL
    descriptionThe remote Mac OS X host is running a version of Microsoft Office that is affected by the following vulnerabilities : - A use-after-free vulnerability could be triggered when reading a specially crafted Word file. (CVE-2011-1983) - A memory corruption vulnerability could be triggered when reading a specially crafted Excel file. (CVE-2011-3403) - A memory corruption vulnerability could be triggered when reading an invalid record in a specially crafted PowerPoint file. (CVE-2011-3413) If a remote attacker can trick a user into opening a malicious file using the affected install, these vulnerabilities could be leveraged to execute arbitrary code subject to the user
    last seen2019-10-28
    modified2011-12-13
    plugin id57286
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57286
    titleMS11-089 / MS11-094 / MS11-096 : Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2590602 / 2639142 / 2640241) (Mac OS X)
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(57286);
      script_version("1.18");
      script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/14");
    
      script_cve_id("CVE-2011-1983", "CVE-2011-3403", "CVE-2011-3413");
      script_bugtraq_id(50954, 50956, 50964);
      script_xref(name:"MSFT", value:"MS11-089");
      script_xref(name:"IAVA", value:"2011-A-0166");
      script_xref(name:"MSFT", value:"MS11-094");
      script_xref(name:"MSFT", value:"MS11-096");
      script_xref(name:"MSKB", value:"2590602");
      script_xref(name:"MSKB", value:"2639142");
      script_xref(name:"MSKB", value:"2640241");
      script_xref(name:"MSKB", value:"2644347");
      script_xref(name:"MSKB", value:"2644354");
      script_xref(name:"MSKB", value:"2644358");
    
      script_name(english:"MS11-089 / MS11-094 / MS11-096 : Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2590602 / 2639142 / 2640241) (Mac OS X)");
      script_summary(english:"Check version of Microsoft Office");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote Mac OS X host is affected by
    multiple remote code execution vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Mac OS X host is running a version of Microsoft Office that
    is affected by the following vulnerabilities :
    
      - A use-after-free vulnerability could be triggered when
        reading a specially crafted Word file. (CVE-2011-1983)
    
      - A memory corruption vulnerability could be triggered
        when reading a specially crafted Excel file.
        (CVE-2011-3403)
    
      - A memory corruption vulnerability could be triggered
        when reading an invalid record in a specially crafted
        PowerPoint file. (CVE-2011-3413)
    
    If a remote attacker can trick a user into opening a malicious file
    using the affected install, these vulnerabilities could be leveraged
    to execute arbitrary code subject to the user's privileges.");
      script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms11-089");
      script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms11-094");
      script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms11-096");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a patch for Office for Mac 2011, Office 2008
    for Mac, and Office 2004 for Mac.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2011/12/13");
      script_set_attribute(attribute:"patch_publication_date", value:"2011/12/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2004::mac");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2008::mac");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2011::mac");
      script_set_attribute(attribute:"stig_severity", value:"II");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("ssh_func.inc");
    include("macosx_func.inc");
    
    
    
    if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)
      enable_ssh_wrappers();
    else disable_ssh_wrappers();
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    os = get_kb_item("Host/MacOSX/Version");
    if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
    
    
    # Gather version info.
    info = '';
    installs = make_array();
    
    prod = 'Office for Mac 2011';
    plist = "/Applications/Microsoft Office 2011/Office/MicrosoftComponentPlugin.framework/Versions/14/Resources/Info.plist";
    cmd =  'cat \'' + plist + '\' | ' +
      'grep -A 1 CFBundleShortVersionString | ' +
      'tail -n 1 | ' +
      'sed \'s/.*string>\\(.*\\)<\\/string>.*/\\1/g\'';
    version = exec_cmd(cmd:cmd);
    if (version && version =~ "^[0-9]+\.")
    {
      version = chomp(version);
      if (version !~ "^14\.") exit(1, "Failed to get the version for "+prod+" - '"+version+"'.");
    
      installs[prod] = version;
    
      ver = split(version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(ver); i++)
        ver[i] = int(ver[i]);
    
      fixed_version = '14.1.4';
      fix = split(fixed_version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(fix); i++)
        fix[i] = int(fix[i]);
    
      for (i=0; i<max_index(fix); i++)
        if ((ver[i] < fix[i]))
        {
          info +=
            '\n  Product           : ' + prod +
            '\n  Installed version : ' + version +
            '\n  Fixed version     : ' + fixed_version + '\n';
          break;
        }
        else if (ver[i] > fix[i])
          break;
    }
    
    prod = 'Office 2008 for Mac';
    plist = "/Applications/Microsoft Office 2008/Office/MicrosoftComponentPlugin.framework/Versions/12/Resources/Info.plist";
    cmd =  'cat \'' + plist + '\' | ' +
      'grep -A 1 CFBundleShortVersionString | ' +
      'tail -n 1 | ' +
      'sed \'s/.*string>\\(.*\\)<\\/string>.*/\\1/g\'';
    version = exec_cmd(cmd:cmd);
    if (version && version =~ "^[0-9]+\.")
    {
      version = chomp(version);
      if (version !~ "^12\.") exit(1, "Failed to get the version for "+prod+" - '"+version+"'.");
    
      installs[prod] = version;
    
      fixed_version = '12.3.2';
      if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
      {
        info +=
          '\n  Product           : ' + prod +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fixed_version + '\n';
      }
    }
    
    prod = 'Office 2004 for Mac';
    cmd = GetCarbonVersionCmd(file:"Microsoft Component Plugin", path:"/Applications/Microsoft Office 2004/Office");
    version = exec_cmd(cmd:cmd);
    if (version && version =~ "^[0-9]+\.")
    {
      version = chomp(version);
      if (version !~ "^11\.") exit(1, "Failed to get the version for "+prod+" - '"+version+"'.");
    
      installs[prod] = version;
    
      ver = split(version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(ver); i++)
        ver[i] = int(ver[i]);
    
      fixed_version = '11.6.6';
      fix = split(fixed_version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(fix); i++)
        fix[i] = int(fix[i]);
    
      for (i=0; i<max_index(fix); i++)
        if ((ver[i] < fix[i]))
        {
          info +=
            '\n  Product           : ' + prod +
            '\n  Installed version : ' + version +
            '\n  Fixed version     : ' + fixed_version + '\n';
          break;
        }
        else if (ver[i] > fix[i])
          break;
    }
    
    
    # Report findings.
    if (info)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:info);
      else security_hole(0);
    
      exit(0);
    }
    else
    {
      if (max_index(keys(installs)) == 0) exit(0, "Office for Mac is not installed.");
      else
      {
        msg = 'The host has ';
        foreach prod (sort(keys(installs)))
          msg += prod + ' ' + installs[prod] + ' and ';
        msg = substr(msg, 0, strlen(msg)-1-strlen(' and '));
    
        msg += ' installed and thus is not affected.';
    
        exit(0, msg);
      }
    }
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS11-089.NASL
    descriptionThe version of Microsoft Office installed on the remote host has a use-after-free vulnerability. A remote attacker could exploit this by tricking a user into opening a specially crafted Word file, resulting in arbitrary code execution.
    last seen2020-06-01
    modified2020-06-02
    plugin id57275
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57275
    titleMS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2590602)

Oval

  • accepted2012-03-05T04:00:07.990-05:00
    classvulnerability
    contributors
    • nameJosh Turpin
      organizationSymantec Corporation
    • nameJosh Turpin
      organizationSymantec Corporation
    definition_extensions
    • commentMicrosoft Windows XP (x86) SP3 is installed
      ovaloval:org.mitre.oval:def:5631
    • commentMicrosoft Windows XP x64 Edition SP2 is installed
      ovaloval:org.mitre.oval:def:4193
    • commentMicrosoft Windows Server 2003 SP2 (x64) is installed
      ovaloval:org.mitre.oval:def:2161
    • commentMicrosoft Windows Server 2003 SP2 (x86) is installed
      ovaloval:org.mitre.oval:def:1935
    • commentMicrosoft Windows Server 2003 (ia64) SP2 is installed
      ovaloval:org.mitre.oval:def:1442
    • commentMicrosoft Windows Vista (32-bit) Service Pack 2 is installed
      ovaloval:org.mitre.oval:def:6124
    • commentMicrosoft Windows Vista x64 Edition Service Pack 2 is installed
      ovaloval:org.mitre.oval:def:5594
    • commentMicrosoft Windows Server 2008 (32-bit) Service Pack 2 is installed
      ovaloval:org.mitre.oval:def:5653
    • commentMicrosoft Windows Server 2008 x64 Edition Service Pack 2 is installed
      ovaloval:org.mitre.oval:def:6216
    • commentMicrosoft Windows Server 2008 Itanium-Based Edition Service Pack 2 is installed
      ovaloval:org.mitre.oval:def:6150
    • commentMicrosoft Windows 7 (32-bit) is installed
      ovaloval:org.mitre.oval:def:6165
    • commentMicrosoft Windows 7 x64 Edition is installed
      ovaloval:org.mitre.oval:def:5950
    • commentMicrosoft Windows Server 2008 R2 x64 Edition is installed
      ovaloval:org.mitre.oval:def:6438
    • commentMicrosoft Windows Server 2008 R2 Itanium-Based Edition is installed
      ovaloval:org.mitre.oval:def:5954
    • commentMicrosoft Windows 7 (32-bit) Service Pack 1 is installed
      ovaloval:org.mitre.oval:def:12292
    • commentMicrosoft Windows 7 x64 Service Pack 1 is installed
      ovaloval:org.mitre.oval:def:12627
    • commentMicrosoft Windows Server 2008 R2 x64 Service Pack 1 is installed
      ovaloval:org.mitre.oval:def:12567
    • commentMicrosoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 is installed
      ovaloval:org.mitre.oval:def:12583
    descriptionIncomplete blacklist vulnerability in the Windows Packager configuration in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted ClickOnce application in a Microsoft Office document, related to .application files, aka "Assembly Execution Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:14197
    statusaccepted
    submitted2012-01-10T13:00:00
    titleAssembly Execution Vulnerability
    version73
  • accepted2014-05-26T04:00:07.467-04:00
    classvulnerability
    contributors
    • nameJosh Turpin
      organizationSymantec Corporation
    • nameMaria Mikhno
      organizationALTX-SOFT
    definition_extensions
    • commentMicrosoft Office 2007 SP2 is installed
      ovaloval:org.mitre.oval:def:15607
    • commentMicrosoft Office 2007 SP3 is installed
      ovaloval:org.mitre.oval:def:15704
    • commentMicrosoft Office 2010 is installed
      ovaloval:org.mitre.oval:def:12061
    descriptionUse-after-free vulnerability in Microsoft Office 2007 SP2 and SP3, Office 2010 Gold and SP1, and Office for Mac 2011 allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Use After Free Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:14558
    statusaccepted
    submitted2011-12-13T13:00:00
    titleTrueType Font Parsing Vulnerability
    version21

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 50956 CVE ID: CVE-2011-1983 Microsoft Word属于办公软件是微软公司的一个文字处理器应用程序。最初是由Richard Brodie为了运行DOS的IBM计算机而在1983年编写的。 Microsoft Office Word处理特制Word文件的方式中存在远程代码执行漏洞,成功利用后可允许攻击者以当前用户权限执行任意代码。 Microsoft Word 2010 SP1 Microsoft Word 2010 Microsoft Word 2007 SP3 Microsoft Word 2007 SP2 Microsoft Word 2007 SP1 临时解决方法: * 不要打开可疑源接收到的或从可信源意外接收到的Office文件。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS11-089)以及相应补丁: MS11-089:Vulnerability in Microsoft Office Could Allow Remote Code Execution (2590602) 链接:http://www.microsoft.com/technet/security/bulletin/MS11-089.asp
idSSV:26059
last seen2017-11-19
modified2011-12-15
published2011-12-15
reporterRoot
titleMicrosoft Word非法访问远程代码执行漏洞(MS11-089)