Vulnerabilities > CVE-2014-6357 - Unspecified vulnerability in Microsoft products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus

Summary

Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability."

Msbulletin

bulletin_idMS14-081
bulletin_url
date2014-12-09T00:00:00
impactRemote Code Execution
knowledgebase_id3017301
knowledgebase_url
severityCritical
titleVulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution

Nessus

  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS14-081.NASL
    descriptionThe remote Windows host has a version of Microsoft Office, Microsoft Word, Office Compatibility Pack, Microsoft Word Viewer, SharePoint Server, or Microsoft Office Web Apps that is affected by one or more remote code execution vulnerabilities due to Microsoft Word improperly handling objects in memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user.
    last seen2020-06-01
    modified2020-06-02
    plugin id79830
    published2014-12-09
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79830
    titleMS14-081: Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3017301)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79830);
      script_version("1.7");
      script_cvs_date("Date: 2018/07/30 15:31:33");
    
      script_cve_id("CVE-2014-6356", "CVE-2014-6357");
      script_bugtraq_id(71469, 71470);
      script_xref(name:"MSFT", value:"MS14-081");
      script_xref(name:"MSKB", value:"2920793");
      script_xref(name:"MSKB", value:"2899518");
      script_xref(name:"MSKB", value:"2899519");
      script_xref(name:"MSKB", value:"2910916");
      script_xref(name:"MSKB", value:"2920729");
      script_xref(name:"MSKB", value:"2920792");
      script_xref(name:"MSKB", value:"2899581");
      script_xref(name:"MSKB", value:"2883050");
      script_xref(name:"MSKB", value:"2910892");
      script_xref(name:"MSKB", value:"2889851");
      script_xref(name:"IAVA", value:"2014-A-0190");
    
      script_name(english:"MS14-081: Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3017301)");
      script_summary(english:"Checks Word / Office Web Apps version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host is affected by multiple remote code execution
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Windows host has a version of Microsoft Office, Microsoft
    Word, Office Compatibility Pack, Microsoft Word Viewer, SharePoint
    Server, or Microsoft Office Web Apps that is affected by one or more
    remote code execution vulnerabilities due to Microsoft Word improperly
    handling objects in memory. A remote attacker can exploit this
    vulnerability by convincing a user to open a specially crafted Office
    file, resulting in execution of arbitrary code in the context of the
    current user.");
      script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/ms14-081");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a set of patches for Office 2007, 2010, 2013,
    Office Compatibility Pack, Microsoft Word Viewer, SharePoint Server,
    and Office Web Apps.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/09");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:word_viewer");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office_compatibility_pack");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:sharepoint_server");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office_web_apps");
      script_set_attribute(attribute:"stig_severity", value:"II");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("office_installed.nasl", "microsoft_sharepoint_installed.nbin", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_reg_query.inc");
    include("misc_func.inc");
    
    global_var bulletin, vuln;
    
    function get_ver()
    {
      local_var fh, path, rc, share, ver;
    
      path = _FCT_ANON_ARGS[0];
    
      share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:path);
    
      rc = NetUseAdd(share:share);
      if (rc != 1)
      {
        NetUseDel();
        audit(AUDIT_SHARE_FAIL, share);
      }
    
      ver = NULL;
      path = ereg_replace(string:path, pattern:"^[A-Za-z]:(.*)", replace:'\\1\\');
    
      fh = CreateFile(
        file               : path,
        desired_access     : GENERIC_READ,
        file_attributes    : FILE_ATTRIBUTE_NORMAL,
        share_mode         : FILE_SHARE_READ,
        create_disposition : OPEN_EXISTING
      );
      if (!isnull(fh))
      {
        ver = GetFileVersion(handle:fh);
        ver = join(ver, sep:".");
        CloseFile(handle:fh);
      }
    
      NetUseDel(close:FALSE);
    
      return ver;
    }
    
    function check_vuln(fix, kb, name, path, ver)
    {
      local_var info;
    
      if (isnull(ver))
        ver = get_ver(path);
    
      if (isnull(ver) || ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0)
        return 0;
    
      info =
        '\n  Product           : ' + name +
        '\n  Path              : ' + path +
        '\n  Installed version : ' + ver +
        '\n  Fixed version     : ' + fix +
        '\n';
      hotfix_add_report(info, bulletin:bulletin, kb:kb);
    
      vuln = TRUE;
    }
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    # Get path information for Windows.
    windir = hotfix_get_systemroot();
    if (isnull(windir)) exit(1, "Failed to determine the location of %windir%.");
    
    bulletin = 'MS14-081';
    kbs = make_list(
      2920793, # Word 2007
      2899518, # Office 2010
      2899519, # Word 2010
      2910916, # Word 2013
      2920729, # Word Viewer
      2920792, # Office Compatibility Pack SP3
      2899581, # Word Automation Services SharePoint Server 2010
      2883050, # Word Automation Services SharePoint Server 2013
      2910892, # Office Web Apps 2010
      2889851 # Office Web Apps 2013
    );
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated", exit_code:1);
    
    # Connect to the registry.
    registry_init();
    hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);
    
    # Get path information for SharePoint Server 2010.
    sps_2010_path = get_registry_value(
      handle : hklm,
      item   : "SOFTWARE\Microsoft\Office Server\14.0\InstallPath"
    );
    
    # Get the path information for SharePoint Server 2013
    sps_2013_path = get_registry_value(
      handle : hklm,
      item   : "SOFTWARE\Microsoft\Office Server\15.0\InstallPath"
    );
    
    owa_2013_path = get_registry_value(
      handle : hklm,
      item   : "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Office15.WacServer\InstallLocation"
    );
    
    # Close connection to registry.
    RegCloseKey(handle:hklm);
    close_registry(close:FALSE);
    # Get path information for Office Web Apps.
    owa_2010_path = sps_2010_path;
    ######################################################################
    # Office Web Apps 2010 SP1 / SP2
    ######################################################################
    if (owa_2010_path)
    {
      check_vuln(
        name : "Office Web Apps 2010",
        kb   : "2910892",
        path : owa_2010_path + "WebServices\ConversionService\Bin\Converter\sword.dll",
        fix  : "14.0.7140.5000"
      );
    }
    
    ######################################################################
    # Office Web Apps 2013
    ######################################################################
    if (owa_2013_path)
    {
      check_vuln(
        name : "Office Web Apps 2013",
        kb   : "2889851",
        path : windir + "\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Office.Web.Apps.Environment.WacServer\v4.0_15.0.0.0__71e9bce111e9429c\Microsoft.Office.Web.Apps.Environment.WacServer.dll",
        fix  : "15.0.4611.1000"
      );
    }
    
    ######################################################################
    # SharePoint Server 2010 SP1 / SP2
    ######################################################################
    if (sps_2010_path)
    {
      check_vuln(
        name : "Office SharePoint Server 2010",
        kb   : "2899581",
        path : sps_2010_path + "WebServices\WordServer\Core\sword.dll",
        fix  : "14.0.7140.5000"
      );
    }
    
    ######################################################################
    # SharePoint Server 2013
    ######################################################################
    if (sps_2013_path)
    {
      check_vuln(
        name : "Office SharePoint Server 2013",
        kb   : "2883050",
        path : sps_2013_path + "WebServices\ConversionServices\sword.dll",
        fix  : "15.0.4675.1000"
      );
    }
    
    # Word
    kb = "";
    installs = get_kb_list("SMB/Office/Word/*/ProductPath");
    if (!isnull(installs))
    {
      foreach install (keys(installs))
      {
        version = install - 'SMB/Office/Word/' - '/ProductPath';
        path = installs[install];
        info = "";
    
        ver = split(version, sep:'.', keep:FALSE);
        for (i=0; i<max_index(ver); i++)
        ver[i] = int(ver[i]);
    
        if(ver[0] == 15 && ver[1] == 0)
        {
          # Word 2013
          if (
            ver[2] < 4675 ||
            (ver[2] == 4675 && ver[3] < 1000)
          )
          {
            office_sp = get_kb_item("SMB/Office/2013/SP");
            if (!isnull(office_sp) && (office_sp == 0 || office_sp == 1))
            {
              info =
                '\n  Product           : Word 2013' +
                '\n  File              : ' + path +
                '\n  Installed version : ' + version +
                '\n  Fixed version     : 15.0.4675.1000' + '\n';
              kb = "2910916";
            }
          }
        }
    
        # Word 2010 SP1 and SP2
        if (
          ver[0] == 14 && ver[1] == 0 &&
          (
            ver[2] < 7140 ||
            (ver[2] == 7140 && ver[3] < 5000)
          )
        )
        {
          office_sp = get_kb_item("SMB/Office/2010/SP");
          if (!isnull(office_sp) && (office_sp == 2))
          {
            info =
              '\n  Product           : Word 2010' +
              '\n  File              : ' + path +
              '\n  Installed version : ' + version +
              '\n  Fixed version     : 14.0.7140.5000' + '\n';
            kb = "2899519";
          }
        }
    
        # Word 2007 SP3
        if (
          ver[0] == 12 && ver[1] == 0 &&
          (
            ver[2] < 6713 ||
            (ver[2] == 6713 && ver[3] < 5000)
          )
        )
        {
          office_sp = get_kb_item("SMB/Office/2007/SP");
          if (!isnull(office_sp) && office_sp == 3)
          {
            info =
              '\n  Product           : Word 2007 SP3' +
              '\n  File              : ' + path +
              '\n  Installed version : ' + version +
              '\n  Fixed version     : 12.0.6713.5000' + '\n';
            kb = "2920793";
          }
        }
    
        if (info)
        {
          hotfix_add_report(info, bulletin:bulletin, kb:kb);
          vuln = TRUE;
        }
      }
    }
    
    # Word Viewer
    installs = get_kb_list("SMB/Office/WordViewer/*/ProductPath");
    if (!isnull(installs))
    {
      foreach install (keys(installs))
      {
        info = "";
        version = install - 'SMB/Office/WordViewer/' - '/ProductPath';
        path = installs[install];
        if (isnull(path)) path = "n/a";
    
        ver = split(version, sep:'.', keep:FALSE);
        for (i=0; i<max_index(ver); i++)
        ver[i] = int(ver[i]);
    
        if (ver[0] == 11 && ver[1] == 0 && ver[2] < 8414)
        {
          info =
            '\n  Product           : Word Viewer' +
            '\n  File              : ' + path +
            '\n  Installed version : ' + version +
            '\n  Fixed version     : 11.0.8414.0' + '\n';
          kb = "2920729";
        }
    
        if (info)
        {
          hotfix_add_report(info, bulletin:bulletin, kb:kb);
          vuln = TRUE;
          break;
        }
      }
    }
    
    # Ensure Office is installed
    office_vers = hotfix_check_office_version();
    if (!isnull(office_vers))
    {
      # Ensure we can get common files directory
      commonfiles = hotfix_get_officecommonfilesdir(officever:"14.0");
      if (commonfiles)
      {
        # Ensure share is accessible
        share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:commonfiles);
        if (is_accessible_share(share:share))
        {
          # Office 2010
          if (office_vers["14.0"])
          {
            office_sp = get_kb_item("SMB/Office/2010/SP");
            if (!isnull(office_sp) && office_sp == 2)
            {
              path = get_kb_item("SMB/Office/Word/14.0/Path");
              if (path)
              {
                old_report = hotfix_get_report();
                check_file = "Wwlib.dll";
    
                if (hotfix_check_fversion(path:path, file:check_file, version:"14.0.7140.5000", min_version:"14.0.0.0") == HCF_OLDER)
                {
                  file = ereg_replace(pattern:"^[A-Za-z]:(.*)", string:path, replace:"\1\" + check_file);
                  kb_name = "SMB/FileVersions/"+tolower(share-'$')+tolower(str_replace(string:file, find:"\", replace:"/"));
                  kb_name = str_replace(find:"//", replace:"/", string:kb_name);
                  version = get_kb_item(kb_name);
    
                  info =
                    '\n  Product           : Microsoft Office 2010' +
                    '\n  File              : ' + path + '\\' + check_file +
                    '\n  Installed version : ' + version +
                    '\n  Fixed version     : 14.0.7140.5000' + '\n';
    
                  hcf_report = '';
                  hotfix_add_report(old_report + info, bulletin:bulletin, kb:"2899518");
                  vuln = TRUE;
                }
              }
            }
          }
        }
      }
    }
    
    version = '';
    installs = get_kb_list("SMB/Office/WordCnv/*/ProductPath");
    if (!isnull(installs))
    {
      foreach install (keys(installs))
      {
        version = install - 'SMB/Office/WordCnv/' - '/ProductPath';
        path = installs[install];
    
        if (!isnull(path))
        {
          share = hotfix_path2share(path:path);
          if (!is_accessible_share(share:share))
            audit(AUDIT_SHARE_FAIL, share);
    
          path = path - '\\Wordconv.exe';
    
          old_report = hotfix_get_report();
          check_file = "wordcnv.dll";
    
          if (hotfix_check_fversion(path:path, file:check_file, version:"12.0.6713.5000", min_version:"12.0.0.0") == HCF_OLDER)
          {
            file = ereg_replace(pattern:"^[A-Za-z]:(.*)", string:path, replace:"\1\" + check_file);
            kb_name = "SMB/FileVersions/"+tolower(share-'$')+tolower(str_replace(string:file, find:"\", replace:"/"));
            kb_name = ereg_replace(pattern:"//"+check_file, replace:"/"+check_file, string:kb_name);
            version = get_kb_item(kb_name);
    
            info =
              '\n  Product           : Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats' +
              '\n  File              : ' + path + '\\' + check_file +
              '\n  Installed version : ' + version +
              '\n  Fixed version     : 12.0.6713.5000' + '\n';
    
            hcf_report = '';
            hotfix_add_report(old_report + info, bulletin:bulletin, kb:"2920792");
            vuln = TRUE;
          }
        }
      }
    }
    
    if (!version)
    {
      # Additional check if registry key is missing
      path = hotfix_get_officecommonfilesdir(officever:"12.0") + "\Microsoft Office\Office12";
    
      kb = "2920792";
      if (
        hotfix_is_vulnerable(file:"wordcnv.dll", version:"12.0.6713.5000", min_version:"12.0.0.0", path:path, bulletin:bulletin, kb:kb)
      ) vuln = TRUE;
    }
    
    if (vuln)
    {
      set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_hole();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, 'affected');
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_MS14-081.NASL
    descriptionThe remote Mac OS X host is running a version of Microsoft Word that is affected by a remote code execution vulnerability due to Microsoft Word improperly handling objects in memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted Office file, resulting in execution of arbitrary code in the context of the current user.
    last seen2019-10-28
    modified2014-12-09
    plugin id79829
    published2014-12-09
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79829
    titleMS14-081: Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution (3017301) (Mac OS X)
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79829);
      script_version("1.7");
      script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/14");
    
      script_cve_id("CVE-2014-6357");
      script_bugtraq_id(71469);
      script_xref(name:"MSFT", value:"MS14-081");
      script_xref(name:"IAVA", value:"2014-A-0190");
      script_xref(name:"MSKB", value:"3018888");
    
      script_name(english:"MS14-081: Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution (3017301) (Mac OS X)");
      script_summary(english:"Checks the version of Microsoft Office.");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote Mac OS X host is affected by a
    remote code execution vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The remote Mac OS X host is running a version of Microsoft Word that
    is affected by a remote code execution vulnerability due to Microsoft
    Word improperly handling objects in memory. A remote attacker can
    exploit this vulnerability by convincing a user to open a specially
    crafted Office file, resulting in execution of arbitrary code in the
    context of the current user.");
      script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/ms14-081");
      script_set_attribute(attribute:"solution", value:"Microsoft has released a patch for Office for Mac 2011.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/09");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2011::mac");
      script_set_attribute(attribute:"stig_severity", value:"II");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("ssh_func.inc");
    include("macosx_func.inc");
    
    
    if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)
      enable_ssh_wrappers();
    else disable_ssh_wrappers();
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    os = get_kb_item("Host/MacOSX/Version");
    if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
    
    # Gather version info.
    info = '';
    installs = make_array();
    
    prod = 'Office for Mac 2011';
    plist = "/Applications/Microsoft Office 2011/Office/MicrosoftComponentPlugin.framework/Versions/14/Resources/Info.plist";
    cmd =  'cat \'' + plist + '\' | ' +
      'grep -A 1 CFBundleShortVersionString | ' +
      'tail -n 1 | ' +
      'sed \'s/.*string>\\(.*\\)<\\/string>.*/\\1/g\'';
    version = exec_cmd(cmd:cmd);
    if (version && version =~ "^[0-9]+\.")
    {
      version = chomp(version);
      if (version !~ "^14\.") exit(1, "Failed to get the version for "+prod+" - '"+version+"'.");
    
      installs[prod] = version;
    
      ver = split(version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(ver); i++)
        ver[i] = int(ver[i]);
    
      fixed_version = '14.4.7';
      fix = split(fixed_version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(fix); i++)
        fix[i] = int(fix[i]);
    
      for (i=0; i<max_index(fix); i++)
        if ((ver[i] < fix[i]))
        {
          info +=
            '\n  Product           : ' + prod +
            '\n  Installed version : ' + version +
            '\n  Fixed version     : ' + fixed_version + '\n';
          break;
        }
        else if (ver[i] > fix[i])
          break;
    }
    
    # Report findings.
    if (info)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:info);
      else security_hole(0);
    
      exit(0);
    }
    else
    {
      if (max_index(keys(installs)) == 0) exit(0, "Office for Mac 2011 is not installed.");
      else
      {
        msg = 'The host has ';
        foreach prod (sort(keys(installs)))
          msg += prod + ' ' + installs[prod] + ' and ';
        msg = substr(msg, 0, strlen(msg)-1-strlen(' and '));
    
        msg += ' installed and thus is not affected.';
    
        exit(0, msg);
      }
    }