[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Conditional expression parsing vulnerability in Office for Mac and Open XML File Format Converter for Mac

ID: oval:org.secpod.oval:def:5926Date: (C)2012-06-02   (M)2022-03-02
Class: VULNERABILITYFamily: macos




The host is installed with Office 2008 or 2011 for Mac or Open XML File Format Converter for Mac and is prone to a conditional expression parsing vulnerability. A flaw is present in the application, which fails to properly parse conditional expressions associated with formatting requirements. Successful exploitation could allow attackers to execute arbitrary code.

Platform:
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Product:
Microsoft Office 2008 for Mac
Microsoft Office 2011 for Mac
Open XML File Format Converter for Mac
Reference:
CVE-2011-1989
CVE    1
CVE-2011-1989
CPE    6
cpe:/a:microsoft:office:2011::mac
cpe:/a:microsoft:office:2007:sp2
cpe:/a:microsoft:office:2010:sp1:x64
cpe:/a:microsoft:open_xml_file_format_converter:::mac
...

© SecPod Technologies