Microsoft Security Bulletin MS17-014 - Important. 20 minutes to read. Contributors. In this article Security Update for Microsoft Office (4013241) Published: March 14, 2017 Updated: April 11, 2017 Version: 2.0 Executive Summary This security update resolves vulnerabilities in Microsoft Office.
The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. For more information about the vulnerabilities, see the Affected Software and Vulnerability Severity Ratings section. The security update addresses the vulnerabilities by:. Correcting how Office handles objects in memory. Changing the way certain functions handle objects in memory.
Properly initializing the affected variable. Helping to ensure that SharePoint Server properly sanitizes web requests. Correcting how the Lync for Mac 2011 client validates certificates For more information about the vulnerabilities, see the Vulnerability Information section.
For more information about this update, see. Affected Software and Vulnerability Severity Ratings The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected.
To determine the support life cycle for your software version or edition, see. The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the.
Note Please see the for a new approach to consuming the security update information. You can customize your views and create affected software spreadsheets, as well as download data via a restful API. For more information, please see the. As a reminder, the Security Updates Guide will be replacing security bulletins. Please see our blog post, for more details.
. ntpd Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10.1 Impact: A remote attacker may be able to execute arbitrary code Description: Several issues existed in ntpd that would have allowed an attacker to trigger buffer overflows. These issues were addressed through improved error checking. To verify the ntpd version, type the following command in Terminal: what /usr/sbin/ntpd. This update includes the following versions:. Mountain Lion: ntp-77.1.1. Mavericks: ntp-88.1.1.
Yosemite: ntp-92.5.1 CVE-ID CVE-2014-9295: Stephen Roettger of the Google Security Team. Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Risks are inherent in the use of the Internet.
For additional information. Other company and product names may be trademarks of their respective owners.