Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0074 Security vulnerabilities patched in Microsoft Office, Microsoft Office Services and Web Apps 11 April 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Office Microsoft Excel Microsoft SharePoint Server Microsoft Word Word Automation Services Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Access Privileged Data -- Remote with User Interaction Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-1034 CVE-2018-1032 CVE-2018-1030 CVE-2018-1029 CVE-2018-1028 CVE-2018-1027 CVE-2018-1026 CVE-2018-1014 CVE-2018-1011 CVE-2018-1007 CVE-2018-1005 CVE-2018-0950 CVE-2018-0920 Member content until: Friday, May 11 2018 OVERVIEW Microsoft has released its monthly security patch update for the month of April 2018. [1] This update resolves 13 vulnerabilities across the following products: Excel Services Microsoft Excel 2016 Click-to-Run (C2R) for 32-bit editions Microsoft Excel 2016 Click-to-Run (C2R) for 64-bit editions Microsoft Excel 2007 Service Pack 3 Microsoft Excel 2010 Service Pack 2 (32-bit editions) Microsoft Excel 2010 Service Pack 2 (64-bit editions) Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Excel Viewer 2007 Service Pack 3 Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editions Microsoft Office 2016 Click-to-Run (C2R) for 64-bit editions Microsoft Office 2016 for Mac Microsoft Office Compatibility Pack Service Pack 3 Microsoft Office Web Apps 2010 Service Pack 2 Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Server 2010 Service Pack 2 Microsoft SharePoint Server 2013 Service Pack 1 Microsoft Word 2007 Service Pack 3 Microsoft Word 2010 Service Pack 2 (32-bit editions) Microsoft Word 2010 Service Pack 2 (64-bit editions) Microsoft Word 2013 RT Service Pack 1 Microsoft Word 2013 Service Pack 1 (32-bit editions) Microsoft Word 2013 Service Pack 1 (64-bit editions) Microsoft Word 2016 (32-bit edition) Microsoft Word 2016 (64-bit edition) Word Automation Services IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2018-0920 Remote Code Execution Important CVE-2018-0950 Information Disclosure Important CVE-2018-1005 Elevation of Privilege Important CVE-2018-1007 Information Disclosure Important CVE-2018-1011 Remote Code Execution Important CVE-2018-1014 Elevation of Privilege Important CVE-2018-1026 Remote Code Execution Important CVE-2018-1027 Remote Code Execution Important CVE-2018-1028 Remote Code Execution Important CVE-2018-1029 Remote Code Execution Important CVE-2018-1030 Remote Code Execution Important CVE-2018-1032 Elevation of Privilege Important CVE-2018-1034 Elevation of Privilege Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1] KB4018344, KB4018347, KB4018341, KB4018343, KB4018342 KB4018362, KB4018360, KB4018328, KB4011717, KB4011712 KB4011719, KB4018353, KB4018350, KB4018356, KB4018357 KB4018354, KB4018355, KB4018359, KB4018336, KB4018337 KB4018330, KB4018319, KB4018339, KB4018311, KB4011628 KB4018288, KB4011586 REFERENCES [1] Security Update Guide https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWs1u9Ix+lLeg9Ub1AQhE7A/9FxXfEtz9iS+uNdykulvfXHJavv4hzxWE hteA0yUHTuhMoOPDMrN3j3Ox2Jfoz1JUUSMl8AWq8bYzKjU+PWcfH0O4ihGgF/gz /8VaLcxJIDoVRwN1YotXNvNILaN90pdEEaVKhJp5R8HMCjn0mZpA8hK731ZRiZHY MxGA6DwkIAqJ2+OXu/ofoz6cJcjB9XSDGTI0NlEXaks1/WDUJYzLfSxl5tVBSRPT FGYYQ4gDSxfDqL9hAYMhT9sszEDvDWKjjFlUCBERlaju5zgCLq/CFU/k1+WUQYFR M0Izvyc5iRbf33fH7DnAqTJKJiyf1endnIAbEDeqYDm5xUfZAF+dAWhbmtNRGG4b VJ3Gq9ejLRKO9TLFcU6o/5toh3I46PLVDla7OUv9iZWfZPt+rjH2GkLuZ0LOQwAa sImMtdYKB5/L+xpmX2R7XhgIrXOlT4C7BXg9I+mjRS9c6yAZ0PK+rVwgVZ0jo6K5 qRObnffoX56Oti0xY80G4R5CpZ15bnG5oH9VmGplw4rGRBe/4wVOWTNt8P6jWGs8 h5c8hwOYSRF2ohPkj+lqMsBxiDIaKryGjIBP5fS6HXwFsWNSbdtvGwq7nDa8oCRd lLOj7mGH6nj11Tp9/lCJ9UhAWzfAhwbvlhD9hpny5NklhTqjNu7xTyvDOGWzak8+ m5D3yb5JyEQ= =xfWV -----END PGP SIGNATURE-----