Vulnerabilities > CVE-2018-0907 - Unspecified vulnerability in Microsoft Excel and Office

047910
CVSS 7.8 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
microsoft
nessus

Summary

Microsoft Excel 2007 SP3, Microsoft Excel 2010 SP2, Microsoft Excel 2013 SP1, Microsoft Excel 2016, Microsoft Office 2016 Click-to-Run and Microsoft Office 2016 for Mac allow a security feature bypass vulnerability due to how macro settings are enforced, aka "Microsoft Office Excel Security Feature Bypass".

Vulnerable Configurations

Part Description Count
Application
Microsoft
6

Nessus

  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS18_MAR_EXCEL.NASL
    descriptionThe Microsoft Excel Products are missing a security update. It is, therefore, affected by the following vulnerability : - A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. The security feature bypass by itself does not allow arbitrary code execution. To successfully exploit the vulnerability, an attacker would have to embed a control in an Excel worksheet that specifies a macro should be run. To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Microsoft Office software. The security update addresses the vulnerability by enforcing macro settings on Excel documents. (CVE-2018-0907)
    last seen2020-06-01
    modified2020-06-02
    plugin id108293
    published2018-03-13
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108293
    titleSecurity Updates for Microsoft Excel Products (March 2018)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(108293);
      script_version("1.7");
      script_cvs_date("Date: 2019/11/08");
    
      script_cve_id("CVE-2018-0907");
      script_bugtraq_id(103325);
      script_xref(name:"MSKB", value:"4011675");
      script_xref(name:"MSKB", value:"4011714");
      script_xref(name:"MSKB", value:"4011727");
      script_xref(name:"MSKB", value:"4018291");
      script_xref(name:"MSFT", value:"MS18-4011675");
      script_xref(name:"MSFT", value:"MS18-4011714");
      script_xref(name:"MSFT", value:"MS18-4011727");
      script_xref(name:"MSFT", value:"MS18-4018291");
      script_xref(name:"IAVA", value:"2018-A-0077");
    
      script_name(english:"Security Updates for Microsoft Excel Products (March 2018)");
      script_summary(english:"Checks for Microsoft security updates.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The Microsoft Excel Products are affected by a security feature
    bypass vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The Microsoft Excel Products are missing a security update.
    It is, therefore, affected by the following vulnerability :
    
      - A security feature bypass vulnerability exists in Microsoft
        Office software by not enforcing macro settings on an Excel
        document. The security feature bypass by itself does not allow
        arbitrary code execution. To successfully exploit the
        vulnerability, an attacker would have to embed a control in an
        Excel worksheet that specifies a macro should be run. To exploit
        the vulnerability, an attacker would have to convince a user to
        open a specially crafted file with an affected version of
        Microsoft Office software. The security update addresses the
        vulnerability by enforcing macro settings on Excel documents.
        (CVE-2018-0907)");
      # https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0907
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5bf879e0");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released the following security updates to address this issue:
      -KB4011675
      -KB4011714
      -KB4011727
      -KB4018291");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-0907");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/03/13");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/03/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:excel");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("office_installed.nasl", "microsoft_office_compatibility_pack_installed.nbin", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_reg_query.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    global_var vuln;
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = "MS18-03";
    kbs = make_list(
      '4011675', # Excel 2010 SP2
      '4011714', # Excel 2007 SP3
      '4011727', # Excel 2016
      '4018291'  # Excel 2013 SP1
    );
    
    if (get_kb_item("Host/patch_management_checks"))
      hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated", exit_code:1);
    
    vuln = FALSE;
    port = kb_smb_transport();
    
    ######################################################################
    # Excel 2007, 2010, 2013, 2016
    ######################################################################
    kb16 = "4011727";
    excel_checks = make_array(
      "12.0", make_array("sp", 3, "version", "12.0.6786.5000", "kb", "4011714"),
      "14.0", make_array("sp", 2, "version", "14.0.7195.5000", "kb", "4011675"),
      "15.0", make_array("sp", 1, "version", "15.0.5015.1000", "kb", "4018291"),
      "16.0", make_nested_list(
        make_array("sp", 0, "version", "16.0.8201.2265", "channel", "Deferred", "kb", kb16),
        make_array("sp", 0, "version", "16.0.8431.2236", "channel", "Deferred", "channel_version", "1708", "kb", kb16),
        make_array("sp", 0, "version", "16.0.9126.2072", "channel", "First Release for Deferred", "kb", kb16),
        make_array("sp", 0, "version", "16.0.9029.2253", "channel", "Current", "kb", kb16)
      )
    );
    if (hotfix_check_office_product(product:"Excel", checks:excel_checks, bulletin:bulletin))
      vuln = TRUE;
    
    if (vuln)
    {
      replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_warning();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, 'affected');
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOS_MS18_MAR_OFFICE.NASL
    descriptionThe Microsoft Office 2016 application installed on the remote macOS or Mac OS X host is missing a security update. It is, therefore, affected by the following vulnerabilities: - A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. The security feature bypass by itself does not allow arbitrary code execution. To successfully exploit the vulnerability, an attacker would have to embed a control in an Excel worksheet that specifies a macro should be run. To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Microsoft Office software. The security update addresses the vulnerability by enforcing macro settings on Excel documents. (CVE-2018-0907) - An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. (CVE-2018-0919(
    last seen2020-06-01
    modified2020-06-02
    plugin id108282
    published2018-03-13
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108282
    titleSecurity Update for Microsoft Office (March 2018) (macOS)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(108282);
      script_version("1.3");
      script_cvs_date("Date: 2019/11/08");
    
      script_cve_id("CVE-2018-0907", "CVE-2018-0919");
      script_xref(name:"IAVA", value:"2018-A-0077");
    
      script_name(english:"Security Update for Microsoft Office (March 2018) (macOS)");
      script_summary(english:"Checks the version of Microsoft Office.");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote macOS or Mac OS X host is
    affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The Microsoft Office 2016 application installed on the remote macOS
    or Mac OS X host is missing a security update. It is, therefore,
    affected by the following vulnerabilities:
    
      - A security feature bypass vulnerability exists in Microsoft Office
        software by not enforcing macro settings on an Excel document. The
        security feature bypass by itself does not allow arbitrary code
        execution. To successfully exploit the vulnerability, an attacker
        would have to embed a control in an Excel worksheet that specifies
        a macro should be run. To exploit the vulnerability, an attacker
        would have to convince a user to open a specially crafted file
        with an affected version of Microsoft Office software. The
        security update addresses the vulnerability by enforcing macro
        settings on Excel documents. (CVE-2018-0907)
    
      - An information disclosure vulnerability exists when Microsoft
        Office software reads out of bound memory due to an uninitialized
        variable, which could disclose the contents of memory. An attacker
        who successfully exploited the vulnerability could view out of
        bound memory. (CVE-2018-0919(");
      # https://support.office.com/en-us/article/release-notes-for-office-2016-for-mac-ed2da564-6d53-4542-9954-7e3209681a41?ui=en-US&rs=en-US&ad=US
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f07d9218");
      # https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-0907
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6156de49");
      # https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-0919
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d927b832");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a set of patches for Microsoft Office 2016 for
    Mac.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-0907");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/03/13");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/03/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_office_installed.nbin");
      script_require_keys("Host/MacOSX/Version");
      script_require_ports("installed_sw/Office for Mac 2016 ", "installed_sw/Microsoft Excel");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    os = get_kb_item("Host/MacOSX/Version");
    if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
    
    apps = make_list(
      "Office for Mac 2016",
      "Microsoft Excel"
    );
    
    report = "";
    
    foreach app (apps)
    {
      installs = get_installs(app_name:app);
      if (isnull(installs[1])) continue;
      foreach install (installs[1])
      {
        version = install['version'];
        app_label = app;
        fix = NULL;
        fix_disp = NULL;
    
        if (version =~ "^16\.")
        {
          app_label += " for Mac 2016";
          fix = '16.11.0';
          fix_disp = '16.11 (18031100)';
        }
    
        if (fix && ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
        {
          report +=
            '\n  Product           : ' + app_label +
            '\n  Installed version : ' + version +
            '\n  Fixed version     : ' + fix_disp;
    
          fix_disp = '';
          if (os =~ "^Mac OS X 10\.[0-9](\.|$)")
            report += '\n  Note              : Update will require Mac OS X 10.10.0 or later.\n';
          else report += '\n';
        }
      }
    }
    
    # Report findings.
    if (!empty(report))
      security_report_v4(severity:SECURITY_WARNING, port:0, extra:report);
    else
      audit(AUDIT_HOST_NOT, "affected");