CVE-2016-3279

Severity

43%

Complexity

86%

Confidentiality

48%

Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Excel 2016, Word 2016, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted XLA file, aka "Microsoft Office Remote Code Execution Vulnerability."

Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Excel 2016, Word 2016, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted XLA file, aka "Microsoft Office Remote Code Execution Vulnerability."

CVSS 3.0 Base Score 5.5. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).

Overview

Type

Microsoft

First reported 8 years ago

2016-07-13 01:59:00

Last updated 6 years ago

2018-10-12 22:12:00

Affected Software

Microsoft Excel 2013 Service Pack 1

2013

Microsoft Excel 2016

2016

Microsoft Excel RT 2013 Service Pack 1

2013

Microsoft Office Web Apps 2010 Service Pack 2

2010

Microsoft PowerPoint 2010 Service Pack 2

2010

Microsoft PowerPoint 2013 Service Pack 1

2013

Microsoft PowerPoint RT 2013 Service Pack 1

2013

Microsoft Sharepoint Server 2010 Service Pack 2

2010

Microsoft Word 2010 Service Pack 2

2010

Microsoft Word 2013 Service Pack 1

2013

Microsoft Word 2016

2016

Microsoft Word RT 2013 Service Pack 1

2013

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.