Vulnerabilities > CVE-2014-6357 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 15 |
Msbulletin
bulletin_id | MS14-081 |
bulletin_url | |
date | 2014-12-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 3017301 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution |
Nessus
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS14-081.NASL description The remote Windows host has a version of Microsoft Office, Microsoft Word, Office Compatibility Pack, Microsoft Word Viewer, SharePoint Server, or Microsoft Office Web Apps that is affected by one or more remote code execution vulnerabilities due to Microsoft Word improperly handling objects in memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user. last seen 2020-06-01 modified 2020-06-02 plugin id 79830 published 2014-12-09 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/79830 title MS14-081: Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3017301) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(79830); script_version("1.7"); script_cvs_date("Date: 2018/07/30 15:31:33"); script_cve_id("CVE-2014-6356", "CVE-2014-6357"); script_bugtraq_id(71469, 71470); script_xref(name:"MSFT", value:"MS14-081"); script_xref(name:"MSKB", value:"2920793"); script_xref(name:"MSKB", value:"2899518"); script_xref(name:"MSKB", value:"2899519"); script_xref(name:"MSKB", value:"2910916"); script_xref(name:"MSKB", value:"2920729"); script_xref(name:"MSKB", value:"2920792"); script_xref(name:"MSKB", value:"2899581"); script_xref(name:"MSKB", value:"2883050"); script_xref(name:"MSKB", value:"2910892"); script_xref(name:"MSKB", value:"2889851"); script_xref(name:"IAVA", value:"2014-A-0190"); script_name(english:"MS14-081: Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3017301)"); script_summary(english:"Checks Word / Office Web Apps version."); script_set_attribute(attribute:"synopsis", value: "The remote host is affected by multiple remote code execution vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote Windows host has a version of Microsoft Office, Microsoft Word, Office Compatibility Pack, Microsoft Word Viewer, SharePoint Server, or Microsoft Office Web Apps that is affected by one or more remote code execution vulnerabilities due to Microsoft Word improperly handling objects in memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user."); script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/ms14-081"); script_set_attribute(attribute:"solution", value: "Microsoft has released a set of patches for Office 2007, 2010, 2013, Office Compatibility Pack, Microsoft Word Viewer, SharePoint Server, and Office Web Apps."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/09"); script_set_attribute(attribute:"patch_publication_date", value:"2014/12/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/09"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word_viewer"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office_compatibility_pack"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:sharepoint_server"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office_web_apps"); script_set_attribute(attribute:"stig_severity", value:"II"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows : Microsoft Bulletins"); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_dependencies("office_installed.nasl", "microsoft_sharepoint_installed.nbin", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl"); script_require_keys("SMB/MS_Bulletin_Checks/Possible"); script_require_ports(139, 445, "Host/patch_management_checks"); exit(0); } include("audit.inc"); include("smb_func.inc"); include("smb_hotfixes.inc"); include("smb_hotfixes_fcheck.inc"); include("smb_reg_query.inc"); include("misc_func.inc"); global_var bulletin, vuln; function get_ver() { local_var fh, path, rc, share, ver; path = _FCT_ANON_ARGS[0]; share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:path); rc = NetUseAdd(share:share); if (rc != 1) { NetUseDel(); audit(AUDIT_SHARE_FAIL, share); } ver = NULL; path = ereg_replace(string:path, pattern:"^[A-Za-z]:(.*)", replace:'\\1\\'); fh = CreateFile( file : path, desired_access : GENERIC_READ, file_attributes : FILE_ATTRIBUTE_NORMAL, share_mode : FILE_SHARE_READ, create_disposition : OPEN_EXISTING ); if (!isnull(fh)) { ver = GetFileVersion(handle:fh); ver = join(ver, sep:"."); CloseFile(handle:fh); } NetUseDel(close:FALSE); return ver; } function check_vuln(fix, kb, name, path, ver) { local_var info; if (isnull(ver)) ver = get_ver(path); if (isnull(ver) || ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0) return 0; info = '\n Product : ' + name + '\n Path : ' + path + '\n Installed version : ' + ver + '\n Fixed version : ' + fix + '\n'; hotfix_add_report(info, bulletin:bulletin, kb:kb); vuln = TRUE; } get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible"); # Get path information for Windows. windir = hotfix_get_systemroot(); if (isnull(windir)) exit(1, "Failed to determine the location of %windir%."); bulletin = 'MS14-081'; kbs = make_list( 2920793, # Word 2007 2899518, # Office 2010 2899519, # Word 2010 2910916, # Word 2013 2920729, # Word Viewer 2920792, # Office Compatibility Pack SP3 2899581, # Word Automation Services SharePoint Server 2010 2883050, # Word Automation Services SharePoint Server 2013 2910892, # Office Web Apps 2010 2889851 # Office Web Apps 2013 ); if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE); get_kb_item_or_exit("SMB/Registry/Enumerated", exit_code:1); # Connect to the registry. registry_init(); hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE); # Get path information for SharePoint Server 2010. sps_2010_path = get_registry_value( handle : hklm, item : "SOFTWARE\Microsoft\Office Server\14.0\InstallPath" ); # Get the path information for SharePoint Server 2013 sps_2013_path = get_registry_value( handle : hklm, item : "SOFTWARE\Microsoft\Office Server\15.0\InstallPath" ); owa_2013_path = get_registry_value( handle : hklm, item : "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Office15.WacServer\InstallLocation" ); # Close connection to registry. RegCloseKey(handle:hklm); close_registry(close:FALSE); # Get path information for Office Web Apps. owa_2010_path = sps_2010_path; ###################################################################### # Office Web Apps 2010 SP1 / SP2 ###################################################################### if (owa_2010_path) { check_vuln( name : "Office Web Apps 2010", kb : "2910892", path : owa_2010_path + "WebServices\ConversionService\Bin\Converter\sword.dll", fix : "14.0.7140.5000" ); } ###################################################################### # Office Web Apps 2013 ###################################################################### if (owa_2013_path) { check_vuln( name : "Office Web Apps 2013", kb : "2889851", path : windir + "\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Office.Web.Apps.Environment.WacServer\v4.0_15.0.0.0__71e9bce111e9429c\Microsoft.Office.Web.Apps.Environment.WacServer.dll", fix : "15.0.4611.1000" ); } ###################################################################### # SharePoint Server 2010 SP1 / SP2 ###################################################################### if (sps_2010_path) { check_vuln( name : "Office SharePoint Server 2010", kb : "2899581", path : sps_2010_path + "WebServices\WordServer\Core\sword.dll", fix : "14.0.7140.5000" ); } ###################################################################### # SharePoint Server 2013 ###################################################################### if (sps_2013_path) { check_vuln( name : "Office SharePoint Server 2013", kb : "2883050", path : sps_2013_path + "WebServices\ConversionServices\sword.dll", fix : "15.0.4675.1000" ); } # Word kb = ""; installs = get_kb_list("SMB/Office/Word/*/ProductPath"); if (!isnull(installs)) { foreach install (keys(installs)) { version = install - 'SMB/Office/Word/' - '/ProductPath'; path = installs[install]; info = ""; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); if(ver[0] == 15 && ver[1] == 0) { # Word 2013 if ( ver[2] < 4675 || (ver[2] == 4675 && ver[3] < 1000) ) { office_sp = get_kb_item("SMB/Office/2013/SP"); if (!isnull(office_sp) && (office_sp == 0 || office_sp == 1)) { info = '\n Product : Word 2013' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 15.0.4675.1000' + '\n'; kb = "2910916"; } } } # Word 2010 SP1 and SP2 if ( ver[0] == 14 && ver[1] == 0 && ( ver[2] < 7140 || (ver[2] == 7140 && ver[3] < 5000) ) ) { office_sp = get_kb_item("SMB/Office/2010/SP"); if (!isnull(office_sp) && (office_sp == 2)) { info = '\n Product : Word 2010' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 14.0.7140.5000' + '\n'; kb = "2899519"; } } # Word 2007 SP3 if ( ver[0] == 12 && ver[1] == 0 && ( ver[2] < 6713 || (ver[2] == 6713 && ver[3] < 5000) ) ) { office_sp = get_kb_item("SMB/Office/2007/SP"); if (!isnull(office_sp) && office_sp == 3) { info = '\n Product : Word 2007 SP3' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 12.0.6713.5000' + '\n'; kb = "2920793"; } } if (info) { hotfix_add_report(info, bulletin:bulletin, kb:kb); vuln = TRUE; } } } # Word Viewer installs = get_kb_list("SMB/Office/WordViewer/*/ProductPath"); if (!isnull(installs)) { foreach install (keys(installs)) { info = ""; version = install - 'SMB/Office/WordViewer/' - '/ProductPath'; path = installs[install]; if (isnull(path)) path = "n/a"; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); if (ver[0] == 11 && ver[1] == 0 && ver[2] < 8414) { info = '\n Product : Word Viewer' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 11.0.8414.0' + '\n'; kb = "2920729"; } if (info) { hotfix_add_report(info, bulletin:bulletin, kb:kb); vuln = TRUE; break; } } } # Ensure Office is installed office_vers = hotfix_check_office_version(); if (!isnull(office_vers)) { # Ensure we can get common files directory commonfiles = hotfix_get_officecommonfilesdir(officever:"14.0"); if (commonfiles) { # Ensure share is accessible share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:commonfiles); if (is_accessible_share(share:share)) { # Office 2010 if (office_vers["14.0"]) { office_sp = get_kb_item("SMB/Office/2010/SP"); if (!isnull(office_sp) && office_sp == 2) { path = get_kb_item("SMB/Office/Word/14.0/Path"); if (path) { old_report = hotfix_get_report(); check_file = "Wwlib.dll"; if (hotfix_check_fversion(path:path, file:check_file, version:"14.0.7140.5000", min_version:"14.0.0.0") == HCF_OLDER) { file = ereg_replace(pattern:"^[A-Za-z]:(.*)", string:path, replace:"\1\" + check_file); kb_name = "SMB/FileVersions/"+tolower(share-'$')+tolower(str_replace(string:file, find:"\", replace:"/")); kb_name = str_replace(find:"//", replace:"/", string:kb_name); version = get_kb_item(kb_name); info = '\n Product : Microsoft Office 2010' + '\n File : ' + path + '\\' + check_file + '\n Installed version : ' + version + '\n Fixed version : 14.0.7140.5000' + '\n'; hcf_report = ''; hotfix_add_report(old_report + info, bulletin:bulletin, kb:"2899518"); vuln = TRUE; } } } } } } } version = ''; installs = get_kb_list("SMB/Office/WordCnv/*/ProductPath"); if (!isnull(installs)) { foreach install (keys(installs)) { version = install - 'SMB/Office/WordCnv/' - '/ProductPath'; path = installs[install]; if (!isnull(path)) { share = hotfix_path2share(path:path); if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share); path = path - '\\Wordconv.exe'; old_report = hotfix_get_report(); check_file = "wordcnv.dll"; if (hotfix_check_fversion(path:path, file:check_file, version:"12.0.6713.5000", min_version:"12.0.0.0") == HCF_OLDER) { file = ereg_replace(pattern:"^[A-Za-z]:(.*)", string:path, replace:"\1\" + check_file); kb_name = "SMB/FileVersions/"+tolower(share-'$')+tolower(str_replace(string:file, find:"\", replace:"/")); kb_name = ereg_replace(pattern:"//"+check_file, replace:"/"+check_file, string:kb_name); version = get_kb_item(kb_name); info = '\n Product : Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats' + '\n File : ' + path + '\\' + check_file + '\n Installed version : ' + version + '\n Fixed version : 12.0.6713.5000' + '\n'; hcf_report = ''; hotfix_add_report(old_report + info, bulletin:bulletin, kb:"2920792"); vuln = TRUE; } } } } if (!version) { # Additional check if registry key is missing path = hotfix_get_officecommonfilesdir(officever:"12.0") + "\Microsoft Office\Office12"; kb = "2920792"; if ( hotfix_is_vulnerable(file:"wordcnv.dll", version:"12.0.6713.5000", min_version:"12.0.0.0", path:path, bulletin:bulletin, kb:kb) ) vuln = TRUE; } if (vuln) { set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE); hotfix_security_hole(); hotfix_check_fversion_end(); exit(0); } else { hotfix_check_fversion_end(); audit(AUDIT_HOST_NOT, 'affected'); }
NASL family MacOS X Local Security Checks NASL id MACOSX_MS14-081.NASL description The remote Mac OS X host is running a version of Microsoft Word that is affected by a remote code execution vulnerability due to Microsoft Word improperly handling objects in memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user. last seen 2019-10-28 modified 2014-12-09 plugin id 79829 published 2014-12-09 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/79829 title MS14-081: Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution (3017301) (Mac OS X) code #TRUSTED 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 # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(79829); script_version("1.7"); script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/14"); script_cve_id("CVE-2014-6357"); script_bugtraq_id(71469); script_xref(name:"MSFT", value:"MS14-081"); script_xref(name:"IAVA", value:"2014-A-0190"); script_xref(name:"MSKB", value:"3018888"); script_name(english:"MS14-081: Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution (3017301) (Mac OS X)"); script_summary(english:"Checks the version of Microsoft Office."); script_set_attribute(attribute:"synopsis", value: "An application installed on the remote Mac OS X host is affected by a remote code execution vulnerability."); script_set_attribute(attribute:"description", value: "The remote Mac OS X host is running a version of Microsoft Word that is affected by a remote code execution vulnerability due to Microsoft Word improperly handling objects in memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user."); script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/ms14-081"); script_set_attribute(attribute:"solution", value:"Microsoft has released a patch for Office for Mac 2011."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/09"); script_set_attribute(attribute:"patch_publication_date", value:"2014/12/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/09"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2011::mac"); script_set_attribute(attribute:"stig_severity", value:"II"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("ssh_func.inc"); include("macosx_func.inc"); if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS) enable_ssh_wrappers(); else disable_ssh_wrappers(); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); os = get_kb_item("Host/MacOSX/Version"); if (!os) audit(AUDIT_OS_NOT, "Mac OS X"); # Gather version info. info = ''; installs = make_array(); prod = 'Office for Mac 2011'; plist = "/Applications/Microsoft Office 2011/Office/MicrosoftComponentPlugin.framework/Versions/14/Resources/Info.plist"; cmd = 'cat \'' + plist + '\' | ' + 'grep -A 1 CFBundleShortVersionString | ' + 'tail -n 1 | ' + 'sed \'s/.*string>\\(.*\\)<\\/string>.*/\\1/g\''; version = exec_cmd(cmd:cmd); if (version && version =~ "^[0-9]+\.") { version = chomp(version); if (version !~ "^14\.") exit(1, "Failed to get the version for "+prod+" - '"+version+"'."); installs[prod] = version; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); fixed_version = '14.4.7'; fix = split(fixed_version, sep:'.', keep:FALSE); for (i=0; i<max_index(fix); i++) fix[i] = int(fix[i]); for (i=0; i<max_index(fix); i++) if ((ver[i] < fix[i])) { info += '\n Product : ' + prod + '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version + '\n'; break; } else if (ver[i] > fix[i]) break; } # Report findings. if (info) { if (report_verbosity > 0) security_hole(port:0, extra:info); else security_hole(0); exit(0); } else { if (max_index(keys(installs)) == 0) exit(0, "Office for Mac 2011 is not installed."); else { msg = 'The host has '; foreach prod (sort(keys(installs))) msg += prod + ' ' + installs[prod] + ' and '; msg = substr(msg, 0, strlen(msg)-1-strlen(' and ')); msg += ' installed and thus is not affected.'; exit(0, msg); } }