First published: Wed Jul 13 2016(Updated: )
Microsoft Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2010-sp2 | |
Microsoft Office Web Apps | =2010-sp2 | |
Microsoft SharePoint Server 2010 | =2010-sp2 | |
Microsoft Office Word | =2010-sp2 | |
Microsoft Office Word | =2013-sp1 | |
Microsoft Office Word | =2016 | |
Microsoft Word | =2011 | |
Microsoft Word | =2016 | |
Microsoft Office 2013 RT | =2013-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3281 is classified as critical due to its potential to allow remote code execution.
To fix CVE-2016-3281, update the affected Microsoft Office applications to their latest patches or service packs.
CVE-2016-3281 affects Microsoft Office 2010 SP2, Word 2013 SP1, Word 2016, and other specified versions.
Yes, CVE-2016-3281 affects Microsoft Office applications on both Windows and Mac systems.
Exploiting CVE-2016-3281 could lead to unauthorized access and execution of arbitrary code on the victim's system.