First published: Wed Nov 11 2015(Updated: )
Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Microsoft Office Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Access | =2007-sp3 | |
Microsoft Access | =2010-sp2 | |
Microsoft Access | =2013-sp1 | |
Microsoft Access | =2016 | |
Microsoft Excel for Mac | =2007-sp3 | |
Microsoft Excel for Mac | =2010-sp2 | |
Microsoft Excel for Mac | =2010-sp2 | |
Microsoft Excel for Mac | =2013-sp1 | |
Microsoft Excel for Mac | =2013-sp1 | |
Microsoft Excel for Mac | =2016 | |
Microsoft InfoPath | =2007-sp3 | |
Microsoft InfoPath | =2010-sp2 | |
Microsoft InfoPath | =2013-sp1 | |
Microsoft Lync | =2013-sp1 | |
Microsoft Office 2007 IME | =sp3 | |
Microsoft OneNote for Mac | =2007-sp3 | |
Microsoft OneNote for Mac | =2010-sp2 | |
Microsoft OneNote for Mac | =2013-sp1 | |
Microsoft OneNote for Mac | =2013-sp1 | |
Microsoft OneNote for Mac | =2016 | |
Microsoft Pinyin Ime | =2010 | |
Microsoft PowerPoint | =2007-sp3 | |
Microsoft PowerPoint | =2010-sp2 | |
Microsoft PowerPoint | =2013-sp1 | |
Microsoft PowerPoint | =2013-sp1 | |
Microsoft PowerPoint | =2016 | |
Microsoft Project Professional | =2007-sp3 | |
Microsoft Project Professional | =2016 | |
Microsoft Project Server | =2010-sp2 | |
Microsoft Project Server | =2013-sp1 | |
Microsoft Publisher | =2007-sp3 | |
Microsoft Publisher | =2010-sp2 | |
Microsoft Publisher | =2013-sp1 | |
Microsoft Publisher | =2016 | |
Microsoft Skype for Business | =2016 | |
Microsoft Visio Professional | =2007-sp3 | |
Microsoft Visio Professional | =2010-sp2 | |
Microsoft Visio Professional | =2013-sp1 | |
Microsoft Visio Professional | =2016 | |
Microsoft Word for Android | =2007-sp3 | |
Microsoft Word for Android | =2010-sp2 | |
Microsoft Word for Android | =2013-sp1 | |
Microsoft Word for Android | =2013-sp1 | |
Microsoft Word for Android | =2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2503 is considered a critical vulnerability due to its potential for exploitation.
To fix CVE-2015-2503, ensure that you have the latest security updates installed for the affected Microsoft Office products.
CVE-2015-2503 affects several Microsoft Office products, including Access 2007 and 2010, Excel 2007 and 2010, and others across various versions.
Yes, CVE-2015-2503 can allow attackers to execute arbitrary code, potentially granting unauthorized access to sensitive data.
A practical workaround for CVE-2015-2503 involves disabling macros in Office applications until the software is updated.