First published: Thu Nov 10 2016(Updated: )
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2013 SP1, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Excel | =2011 | |
Microsoft Office | =2010-sp2 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =sp3 | |
Microsoft Office Web Apps | =2010-sp2 | |
Microsoft SharePoint Server 2010 | =2013-sp1 | |
Microsoft Office Word | =2007 | |
Microsoft Office Word | =2010-sp2 | |
Microsoft Word Automation Services | ||
Microsoft Word | =2011 | |
Microsoft Office Word Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7233 has a medium severity rating as it allows remote attackers to obtain sensitive information from memory.
To fix CVE-2016-7233, apply the relevant security updates provided by Microsoft for the affected software versions.
CVE-2016-7233 affects Microsoft Word 2007, Office 2010 SP2, Word for Mac 2011, Excel for Mac 2011, and other Microsoft Office products.
Yes, CVE-2016-7233 can be exploited remotely to access sensitive information.
No specific workaround for CVE-2016-7233 is recommended; updating to the latest version is the best mitigation.