Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2019.0159 Microsoft Office, Microsoft Office Services and Web Apps Security Update 12 June 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Office Operating System: Windows Mac OS Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Increased Privileges -- Existing Account Provide Misleading Information -- Remote/Unauthenticated Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-1036 CVE-2019-1035 CVE-2019-1034 CVE-2019-1033 CVE-2019-1032 CVE-2019-1031 CVE-2019-0963 CVE-2019-0958 CVE-2019-0957 CVE-2019-0956 CVE-2019-0953 CVE-2019-0952 CVE-2019-0951 CVE-2019-0950 CVE-2019-0949 CVE-2019-0947 CVE-2019-0946 CVE-2019-0945 Member content until: Friday, July 12 2019 Reference: ASB-2019.0143 ESB-2019.1980 ESB-2019.1850 ESB-2019.1455.2 OVERVIEW Microsoft has released its monthly security patch update for the month of June 2019. This update resolves 18 vulnerabilities across the following products: [1] Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2016 for Mac Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office Online Server Microsoft Office Web Apps 2010 Service Pack 2 Microsoft Project Server 2010 Service Pack 2 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2010 Service Pack 2 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2010 Service Pack 2 Microsoft SharePoint Server 2019 Microsoft Word 2010 Service Pack 2 (32-bit editions) Microsoft Word 2010 Service Pack 2 (64-bit editions) Microsoft Word 2013 RT Service Pack 1 Microsoft Word 2013 Service Pack 1 (32-bit editions) Microsoft Word 2013 Service Pack 1 (64-bit editions) Microsoft Word 2016 (32-bit edition) Microsoft Word 2016 (64-bit edition) Office 365 ProPlus for 32-bit Systems Office 365 ProPlus for 64-bit Systems IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2019-0945 Remote Code Execution Important CVE-2019-0946 Remote Code Execution Important CVE-2019-0947 Remote Code Execution Important CVE-2019-0949 Spoofing Important CVE-2019-0950 Spoofing Important CVE-2019-0951 Spoofing Important CVE-2019-0952 Remote Code Execution Important CVE-2019-0953 Remote Code Execution Critical CVE-2019-0956 Information Disclosure Important CVE-2019-0957 Elevation of Privilege Important CVE-2019-0958 Elevation of Privilege Important CVE-2019-0963 Spoofing Important CVE-2019-1031 Spoofing Important CVE-2019-1032 Spoofing Important CVE-2019-1033 Spoofing Important CVE-2019-1034 Remote Code Execution Important CVE-2019-1035 Remote Code Execution Important CVE-2019-1036 Spoofing Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Cataloge for the following Knowledge Base articles. [1]. KB4464567, KB4464564, KB4464561, KB4464549, KB4461621 KB4475511, KB4475512, KB4464602, KB4462178, KB4092442 KB4464536, KB4464571, KB4464556, KB4464573, KB4464551 KB4462169, KB4464590, KB4464597, KB4464596, KB4464594 KB4461619, KB4461611 REFERENCES [1] Security Update Guide https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXQCak2aOgq3Tt24GAQipXxAArW3270l0wqOyxvYD72QtMy9nkLjZh9Y1 Um1uzNjf95/FwfVjPQ3uLQZ4cXZIVFuXNS3Uz+MkF2T9WdvHtr1Z4nSx4QJHYoSA 4t7VRa/dY3mllcdATxR9V6FBEHNwdJRshGnNMPVmqBOWMuI9KTzqAx15rMJCXnEW 037a9R5sO6fLNsdnmupaaexYqz9ax3jVSgwUE8CfgjFoKFon89zATfOCHnyEwWNK L8VvCwTajzmAe9LNmFPpgQaxChCggDxdPd67PCoLrdm2t2TN8MflmrPoQ9kdP9aG HSRaDI9UFn3s33fHHf9wNVuy0NM1t4k2VTSyIa0LCK92wowvC13h28FQulQkNHct tt9o4oP4/C01lplafHI+Sxacp0vvIircdXnFA+Ueoi+Af/HXPQJSyMmZVQekWEpL /aD08G+dTzgALqq86V+0ExzU/tL3sKz1fwKg6xnDsKChfAI+z3ptus4qAM+/lSp3 FdvMrMFIpIKdiI6kj7YQbEmLikZCntKLijPOfuA1g94AayxTn+jZdgfGO7H7hiSm KemFZQ1geiUtUt6VIdeHbzIF9LFUgrB72By45zyQl3wS9aWmttMEGIySvl3Ehn+I l4hXdOQwrI02P+hyIw+5ZFGZ4HK4lPrBJbPttLzprGhKLvIkvLoTpPnzlUEicMcv yzeUCzbYXAQ= =q36/ -----END PGP SIGNATURE-----