Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0286 November 2018 update for Microsoft Office products 14 November 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Excel Services Microsoft Excel Microsoft Excel Viewer Microsoft Office Microsoft Office for Mac Microsoft Outlook Microsoft Project Microsoft Project Server Microsoft SharePoint Microsoft Word Microsoft Office 365 ProPlus Operating System: Windows Mac OS Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Cross-site Scripting -- Existing Account Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-8582 CVE-2018-8579 CVE-2018-8578 CVE-2018-8577 CVE-2018-8576 CVE-2018-8575 CVE-2018-8574 CVE-2018-8573 CVE-2018-8572 CVE-2018-8568 CVE-2018-8558 CVE-2018-8546 CVE-2018-8539 CVE-2018-8524 CVE-2018-8522 Member content until: Friday, December 14 2018 OVERVIEW Microsoft has released its monthly security patch update for the month of November 2018. This update resolves 15 vulnerabilities across the following products: [1] Excel Services Microsoft Excel 2010 Service Pack 2 (32-bit editions) Microsoft Excel 2010 Service Pack 2 (64-bit editions) Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Excel Viewer 2007 Service Pack 3 Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2016 for Mac Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office Compatibility Pack Service Pack 3 Microsoft Office Web Apps 2010 Service Pack 2 Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft Outlook 2010 Service Pack 2 (32-bit editions) Microsoft Outlook 2010 Service Pack 2 (64-bit editions) Microsoft Outlook 2013 RT Service Pack 1 Microsoft Outlook 2013 Service Pack 1 (32-bit editions) Microsoft Outlook 2013 Service Pack 1 (64-bit editions) Microsoft Outlook 2016 (32-bit edition) Microsoft Outlook 2016 (64-bit edition) Microsoft Project 2010 Service Pack 2 (32-bit editions) Microsoft Project 2010 Service Pack 2 (64-bit editions) Microsoft Project 2016 (32-bit edition) Microsoft Project 2016 (64-bit edition) Microsoft Project Server 2013 Service Pack 1 (32-bit edition) Microsoft Project Server 2013 Service Pack 1 (64-bit edition) Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2010 Service Pack 2 Microsoft SharePoint Server 2019 Microsoft Word 2010 Service Pack 2 (32-bit editions) Microsoft Word 2010 Service Pack 2 (64-bit editions) Microsoft Word 2013 RT Service Pack 1 Microsoft Word 2013 Service Pack 1 (32-bit editions) Microsoft Word 2013 Service Pack 1 (64-bit editions) Microsoft Word 2016 (32-bit edition) Microsoft Word 2016 (64-bit edition) Office 365 ProPlus for 32-bit Systems Office 365 ProPlus for 64-bit Systems IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2018-8522 Remote Code Execution Important CVE-2018-8524 Remote Code Execution Important CVE-2018-8539 Remote Code Execution Important CVE-2018-8546 Denial of Service Low CVE-2018-8558 Information Disclosure Important CVE-2018-8568 Elevation of Privilege Important CVE-2018-8572 Elevation of Privilege Important CVE-2018-8573 Remote Code Execution Important CVE-2018-8574 Remote Code Execution Important CVE-2018-8575 Remote Code Execution Important CVE-2018-8576 Remote Code Execution Important CVE-2018-8577 Remote Code Execution Important CVE-2018-8578 Information Disclosure Important CVE-2018-8579 Information Disclosure Important CVE-2018-8582 Remote Code Execution Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1] KB3114565, KB4032218, KB4022147, KB4461511, KB4461513 KB4461518, KB4461519, KB4461530, KB4011190, KB4461478 KB4461503, KB4461501, KB4461529, KB4461506, KB4092473 KB4461504, KB4461524, KB4461527, KB4461526, KB4461520 KB4022237, KB4461483, KB4461486, KB4461485, KB4461488 KB4461489, KB4022232 REFERENCES [1] Security Update Guide https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW+txdWaOgq3Tt24GAQg7Rg/8C7X7PCxzzIVgEQYvFLf8ukDI/OU03kuK iv+XR01ENS8NazLGPcxyGxC9GgLPHvtDil1zt51v4P12paZnf7EPEToDN09YEcIo 02V7yUtmKwMcO4ziWpodqhwMkGxcYJXOl2SoN3khfRDkghX0OQ3U1+i3xe1d2mzK OMF7Dl59rPopw0zsvp6ctgscNia1D2lanUzhbKrHn7rrsBGL42JzOvN48ZPeu7GF Be8pv+vtEJVkOYG7GILz+n01PYF5SfrQinpyfBPKprN2qRfEuZIDk9Py1hGIKEEt 47GMLERUCl8SYyPQE7g9sV46CM+FFHLuhFf1EapOwfA5Nhte6opMelnOFhOW05jf se09leVFCaufXCx2H0SF+ZMuE5l/+622X3q/NutLaLUYXTlCZoJaAToZbnpjhcQ3 HZu2+LB3tvlfUhpY3T45z+mRaz7w9GqMtsBGcs1jP2KVsXzG3tMZdd93MbA3GIgu C+nclaCPufx58/mctoixWdeygoMDcW/Z1byhqZy3sidN1/0cU6ahBsLVMUL0OiNq aayCd34dcQ+RzvmhkMe5dCt9CUcPGuSCDFdfSOzzFmpYCxohwqqGMhrdcZAmrDgM Ue0FkEiRSHvDPznY5ReIRvfNy9FMA9SGQKVWxN4GD5zNW+2/ui9hV9n1xqyMOf9y z+yI1nkiyNQ= =CriL -----END PGP SIGNATURE-----