安全研究
安全漏洞
Microsoft Excel远程代码执行漏洞(CVE-2020-16929)
发布日期:2020-10-13
更新日期:2020-10-22
受影响系统:Microsoft Excel 2016 (64-bit editions)
Microsoft Excel 2016 (32-bit editions)
Microsoft Excel 2013 SP1 (64-bit editions)
Microsoft Excel 2013 SP1 (32-bit editions)
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2010 SP2 (64-bit editions)
Microsoft Excel 2010 SP2 (32-bit editions)
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Online Server
Microsoft Office 2019 for Mac
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2016 for Mac
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2013 Service Pack 1 (64-bit ed
Microsoft Office 2013 Service Pack 1 (32-bit ed
Microsoft Office 2013 RT SP1
Microsoft Office 2010 Service Pack 2 (64-bit ed
Microsoft Office 2010 Service Pack 2 (32-bit ed
Microsoft Excel Web App 2010 SP2
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft SharePoint Enterprise Server 2013 Service
Microsoft 365 Apps for Enterprise 64-bit Systems
Microsoft 365 Apps for Enterprise 32-bit Systems
描述:
CVE(CAN) ID:
CVE-2020-16929
Microsoft Excel是美国微软(Microsoft)公司的一款Office套件中的电子表格处理软件。
Microsoft Excel存在远程代码执行漏洞。该漏洞源于程序未对内存中的对象进行正确处理。攻击者可借助特制文件利用该漏洞在当前用户的上下文中执行任意代码,如当前用户使用管理权限登录,则攻击者可安装程序、查看、更改或删除数据以及创建具有完全用户权限的新帐户。以下产品及版本受到影响:Excel 2010 SP2、Excel 2013 SP1、Excel 2013 RT SP1、Excel 2016、Excel Web App 2010 SP2、Office Online Server、Office Web Apps 2013 SP1、Office Web Apps 2010 SP2、Office 2019、Office 2019 for Mac、Office 2016、Office 2016 for Mac、Office 2013 SP1、Office 2013 RT SP1、Office 2010 SP2、365 Apps for Enterprise、SharePoint Server 2010 SP2、Sharepoint Enterprise Server 2013 SP1版本。
<*来源:kdot(Trend Micro's Zero Day Initiative)
*>
建议:
厂商补丁:
Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-oct浏览次数:1051
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载 绿盟科技给您安全的保障 |