First published: Wed Sep 14 2016(Updated: )
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Word for Mac 2011, Word 2016 for Mac, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, SharePoint Server 2013 SP1, Excel Automation Services on SharePoint Server 2013 SP1, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2007-sp3 | |
Microsoft Office | =2010-sp2 | |
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2016 | |
Microsoft Office Web Apps | =2010-sp2 | |
Microsoft Office Web Apps Server 2013 | =2013-sp1 | |
Microsoft SharePoint Foundation 2013 | =2010-sp2 | |
Microsoft SharePoint Foundation 2013 | =2013-sp1 | |
Microsoft Word | =2011 | |
Microsoft Word | =2016 | |
Microsoft Office Word Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3357 is rated as critical due to the potential for remote code execution.
To fix CVE-2016-3357, apply the security updates provided by Microsoft for the affected Office products.
CVE-2016-3357 affects several versions of Microsoft Office, Word for Mac, and SharePoint, including Office 2007, 2010, 2013, 2016, and corresponding web apps.
If exploited, CVE-2016-3357 could allow an attacker to execute arbitrary code on the affected system.
Yes, there are public reports and examples of exploits being used for CVE-2016-3357, emphasizing the importance of applying patches promptly.