First published: Thu Jun 16 2016(Updated: )
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office 2016, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2010-sp2 | |
Microsoft Office | =2016 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =sp3 | |
Microsoft Office Online Server | ||
Microsoft Office Web Apps | =2010-sp2 | |
Microsoft Office Web Apps Server | =2013-sp1 | |
Microsoft SharePoint Server | =2010-sp2 | |
Microsoft SharePoint Server | =2013-sp1 | |
Microsoft Word for Android | =2007-sp3 | |
Microsoft Word for Android | =2010-sp2 | |
Microsoft Word for Android | =2013-sp1 | |
Microsoft Word for Android | =2013-sp1 | |
Microsoft Word for Android | =2016 | |
Microsoft Word | =2011 | |
Microsoft Word | =2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0025 has a severity rating of important according to Microsoft's security guidelines.
To fix CVE-2016-0025, install the latest security updates provided by Microsoft for affected versions of Office and Word.
CVE-2016-0025 affects various versions including Microsoft Word 2007 SP3, Office 2010 SP2, Word 2016, and Word for Mac 2016.
Yes, exploitation of CVE-2016-0025 can allow an attacker to execute arbitrary code on the affected system.
Disabling the use of ActiveX controls in Microsoft Office applications is recommended as a temporary workaround for CVE-2016-0025.