First published: Wed Jul 13 2016(Updated: )
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, SharePoint Server 2016, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2010-sp2 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =sp3 | |
Microsoft Office Online Server | ||
Microsoft Office Web Apps | =2010-sp2 | |
Microsoft Office Web Apps Server | =2013-sp1 | |
Microsoft SharePoint Server | =2010-sp2 | |
Microsoft SharePoint Server | =2013-sp1 | |
Microsoft SharePoint Server | =2016 | |
Microsoft Word for Android | =2007-sp3 | |
Microsoft Word for Android | =2010-sp2 | |
Microsoft Word for Android | =2013-sp1 | |
Microsoft Word for Android | =2016 | |
Microsoft Word | =2011 | |
Microsoft Word | =2016 | |
Microsoft Word | =2013-sp1 | |
Microsoft Word Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3282 is classified as a critical vulnerability that allows for remote code execution.
To fix CVE-2016-3282, update your affected Microsoft Office products to the latest version available.
CVE-2016-3282 affects multiple versions of Microsoft Office and is present in both Windows and Mac operating systems.
CVE-2016-3282 can be exploited through maliciously crafted Word documents opened by vulnerable applications.
If your software is fully updated to the latest security patches, the risk from CVE-2016-3282 should be mitigated.