First published: Wed Feb 10 2016(Updated: )
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0022.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2010-sp2 | |
Microsoft Office | =2010-sp2 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =sp3 | |
Microsoft Office Web Apps Server 2013 | =2013-sp1 | |
Microsoft SharePoint Server 2010 | =2013-sp1 | |
Microsoft Office Word | =2007-sp3 | |
Microsoft Office Word | =2010-sp2 | |
Microsoft Office Word | =2013-sp1 | |
Microsoft Office Word | =2013-sp1 | |
Microsoft Office Word | =2016 | |
Microsoft Word | =2011 | |
Microsoft Word | =2016 | |
Microsoft Office Word Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0052 has been rated as critical due to potential remote code execution vulnerabilities in Microsoft Word.
To fix CVE-2016-0052, apply the latest security patches provided by Microsoft for the affected versions of Word and Office.
CVE-2016-0052 affects Microsoft Word 2007 SP3, Office 2010 SP2, Word 2013 SP1, Word 2016, and several other versions listed in the vulnerability report.
The risks associated with CVE-2016-0052 include remote code execution that allows attackers to execute arbitrary code on the vulnerable system.
Yes, CVE-2016-0052 can be exploited via malicious Word documents sent as email attachments.