Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0191 Microsoft Patch Tuesday update for Microsoft Office, Microsoft Office Services and Web Apps for September 2021 13 October 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft 365 Apps for Enterprise Microsoft Excel 2013 Microsoft Excel 2016 Microsoft Office 2013 Microsoft Office 2016 Microsoft Office 2019 Microsoft Office LTSC 2021 Microsoft Office LTSC for Mac 2021 Microsoft Office Online Server Microsoft Office Web Apps Server 2013 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Microsoft SharePoint Server 2019 Microsoft Word 2013 Microsoft Word 2016 Operating System: Windows macOS Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Provide Misleading Information -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-41344 CVE-2021-40487 CVE-2021-40486 CVE-2021-40485 CVE-2021-40484 CVE-2021-40483 CVE-2021-40482 CVE-2021-40481 CVE-2021-40480 CVE-2021-40479 CVE-2021-40474 CVE-2021-40473 CVE-2021-40472 CVE-2021-40471 CVE-2021-40454 OVERVIEW Microsoft has released its monthly security patch update for the month of October 2021. This update resolves 15 vulnerabilities across the following products: [1] Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft Office Online Server Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 Microsoft Word 2013 RT Service Pack 1 Microsoft Word 2013 Service Pack 1 (32-bit editions) Microsoft Word 2013 Service Pack 1 (64-bit editions) Microsoft Word 2016 (32-bit edition) Microsoft Word 2016 (64-bit edition) IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2021-40454 Information Disclosure Important CVE-2021-40471 Remote Code Execution Important CVE-2021-40472 Information Disclosure Important CVE-2021-40473 Remote Code Execution Important CVE-2021-40474 Remote Code Execution Important CVE-2021-40479 Remote Code Execution Important CVE-2021-40480 Remote Code Execution Important CVE-2021-40481 Remote Code Execution Important CVE-2021-40482 Information Disclosure Important CVE-2021-40483 Spoofing Low CVE-2021-40484 Spoofing Important CVE-2021-40485 Remote Code Execution Important CVE-2021-40486 Remote Code Execution Critical CVE-2021-40487 Remote Code Execution Important CVE-2021-41344 Remote Code Execution Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1]. KB4018332, KB4461476, KB4493202, KB5001924, KB5001960 KB5001982, KB5001985, KB5002004, KB5002006, KB5002027 KB5002028, KB5002029, KB5002030, KB5002036, KB5002042 KB5002043 REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYWY3meNLKJtyKPYoAQhx/g//a15Gd1hJu/wjgL1RNhqroS9LT2NOZ5Lb 5Xu/QsZYnoWy0TVT4R655hQKVaSodk9yYevKzYqs8A0Yd4cyj3Fp4XCuPYANm1N8 4Fi02W4YLnXnw6VMq7Uo6pNjRKPgS3HCQX+H71rIOzr4xnXEboN+xTnbwSnKki8A ZEoe75i/HHfTH9bIPGfBLEzL++dLfHISA0O3Mq8ByOoW+3nzI0Hywpjlh0HHDUJF sJO1mhriYTYrLXw2T1IJnGkm7bJdOQWmHrbZXdAYjq/qk6tAJrwxqKYfIrPRVrGl Y+U7oCfZaVThtGm4D8+YjjCruuWBP7KazLVV3qSvZ5+vV5S1kAGHx5IPoZBAoGB2 nlGdX25OFydBBJd0SAWHo35AGXdKIi4TopCN/LbIJWTa4RNdqfsI1nQ/LdXA8hCK Mpbz2qZsuSdicx6X+sCg5GCSxM32hpGjn/aOKn3OOwuBpv30aCdqTOCKNvttqO/I 0PntsIvxR7jYjuNiWAgMOdkQNNbMgRyGwdBg3/kSAZ9k5hnBAtsDQYUOgQUGXY4N 3w0/R2wnNQxf5guuu54J7QEPVtXJM4g7ewKEgkhh++IiALTkwfqIix/wJvphdPd8 tNfmbw1jHEIxup5lOxLrHD2ASVmO+Tmeh3Vg3tAgOL5K+NYiNWdV044L0qlQR6Dq kvHNHcASjmA= =YmrL -----END PGP SIGNATURE-----