vulnerability

MS16-088: Security Update for Microsoft Office (3170008)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 12, 2016
Added
Jul 12, 2016
Modified
Jul 28, 2025

Description

Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Solutions

WINDOWS-HOTFIX-MS16-088-04b878ff-977f-4671-82e7-101be5218c3bWINDOWS-HOTFIX-MS16-088-0bf6abab-8ed2-4447-addc-2554c8d40fa8WINDOWS-HOTFIX-MS16-088-0e93a1eb-cb32-4436-b7fb-893e8c4d5e8bWINDOWS-HOTFIX-MS16-088-1124e11f-e723-42e3-8a41-a3f27fd3109dWINDOWS-HOTFIX-MS16-088-11af8bc8-b76d-4f5c-878d-1e07e801afb0WINDOWS-HOTFIX-MS16-088-161a6209-5020-497d-b828-800a63049d9eWINDOWS-HOTFIX-MS16-088-1bc44cdb-c88b-4670-9a4d-0c43b91f4568WINDOWS-HOTFIX-MS16-088-222c73f1-b74f-4ac3-868c-5cb949b675b6WINDOWS-HOTFIX-MS16-088-28f3ae85-676a-4d1a-ab2c-aca25f8f8716WINDOWS-HOTFIX-MS16-088-29e87d5a-024d-4fa8-957c-6ef9b709849dWINDOWS-HOTFIX-MS16-088-2d21c165-98a6-4250-a5b0-10cc4dda6d53WINDOWS-HOTFIX-MS16-088-46c329d4-ea4a-4a6b-9867-1c59c9ca0b95WINDOWS-HOTFIX-MS16-088-4afa5685-0a0c-459e-9912-194e344230fbWINDOWS-HOTFIX-MS16-088-4c581e10-f373-4fbd-a15f-4d586bc3a7d9WINDOWS-HOTFIX-MS16-088-4d6b0e15-811d-497b-a549-b7e657894fa7WINDOWS-HOTFIX-MS16-088-59eb8fa7-fdfa-4d30-b39e-66b1bfaeb9a7WINDOWS-HOTFIX-MS16-088-5add4a4c-207f-458f-b7c3-44eb66c03fb7WINDOWS-HOTFIX-MS16-088-5f207bd4-c673-40bf-8fb9-bbbb4d8767d3WINDOWS-HOTFIX-MS16-088-60d0d29f-4660-4196-858a-4d54818ad88dWINDOWS-HOTFIX-MS16-088-66ed6006-0823-4338-a69d-3762f8ac8832WINDOWS-HOTFIX-MS16-088-7129d797-5880-4633-99d7-086a048138f4WINDOWS-HOTFIX-MS16-088-7268071d-2c57-4456-be6d-775cc1b13e97WINDOWS-HOTFIX-MS16-088-73355bbc-14b4-42f6-9679-b2564dbb033aWINDOWS-HOTFIX-MS16-088-74ab5584-ac99-4e2c-998d-a0559e7beaa9WINDOWS-HOTFIX-MS16-088-7743e400-e591-430c-9fc4-b899a94401b3WINDOWS-HOTFIX-MS16-088-79764881-79bf-42b9-b2d5-a1520e87fbd2WINDOWS-HOTFIX-MS16-088-79a0a428-8946-4a19-907f-f8febf7733e7WINDOWS-HOTFIX-MS16-088-7c8ef20f-a98b-46ce-be04-aedf278e817dWINDOWS-HOTFIX-MS16-088-8253db17-3403-49f2-a70c-071ca2871d05WINDOWS-HOTFIX-MS16-088-84189c21-943f-4157-80dd-1e397405456fWINDOWS-HOTFIX-MS16-088-88dd9b41-d47c-4ecb-9b52-bb8183c86036WINDOWS-HOTFIX-MS16-088-8c26c756-49ab-4180-85bd-b60deee3003aWINDOWS-HOTFIX-MS16-088-8f752be7-87a4-425b-a8ce-9a0c3a4eadffWINDOWS-HOTFIX-MS16-088-94fa3144-7c39-48b7-83a3-bab1d944a151WINDOWS-HOTFIX-MS16-088-a25c1638-d9f7-4f06-9256-644bb4e36f41WINDOWS-HOTFIX-MS16-088-b669582b-ab55-4cce-8cf0-5f7d86b63391WINDOWS-HOTFIX-MS16-088-cbb1c7c5-cfc5-4d9c-b409-8eea46175cdfWINDOWS-HOTFIX-MS16-088-cbe6dec3-c326-480d-98d6-6033d96e7945WINDOWS-HOTFIX-MS16-088-cc117372-aea2-45a9-bfb9-664c952a7744WINDOWS-HOTFIX-MS16-088-d9d4ed20-e68a-4ac8-ae21-5210a2df3c4cWINDOWS-HOTFIX-MS16-088-e3a8081d-2d0d-41ce-b96e-1a662c193e05WINDOWS-HOTFIX-MS16-088-e6cc55e8-6b08-44ac-bba0-3d3b14df6443WINDOWS-HOTFIX-MS16-088-ed4183e4-5bd4-4cff-b2ed-7f59c2c66842WINDOWS-HOTFIX-MS16-088-f4951a1b-daa9-4023-ae36-748c6741086cWINDOWS-HOTFIX-MS16-088-f5121d7b-3acd-495e-92ae-82eddb5e55a9

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.