Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0234 Microsoft Patch Tuesday update for Microsoft Office and Microsoft Office Services and Web Apps for November 2021 10 November 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Office Microsoft Office Services and Web Apps Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-42296 CVE-2021-42292 CVE-2021-41368 CVE-2021-40442 Comment: Microsoft is aware that exploits for CVE-2021-42292 exist in the wild. OVERVIEW Microsoft has released its monthly security patch update for the month of November 2021. This update resolves 4 vulnerabilities across the following products: [1] Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft Office Online Server Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2021-40442 Remote Code Execution Important CVE-2021-41368 Remote Code Execution Important CVE-2021-42292 Security Feature Bypass Important CVE-2021-42296 Remote Code Execution Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1]. KB4486670, KB5002032, KB5002035, KB5002038, KB5002053 KB5002056, KB5002063, KB5002065, KB5002072 REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYYsHsuNLKJtyKPYoAQjNrw/+M0SzH74OvlQN3o3ohvbFLeR+jt9lhQot /RhF+0gMlY/OP0yoIcsiC5VIQVCCPlOqvVqFNvIabyUqU+RUTpXv9oorJz9nhZBg NLZR3JGz49QmaHN4SYGNtPcWHlXtoT+Zv1MGDyqGHkchVghVCzA9uetTpot6aFnj Ak1Yxo39zGuXPAh8AcZDXw9M1867esQRS7wr64stUWOvV9oqvTBVS5BJeKrKtAwP 7CdXFE5qZzAP78Gv65T6wA3VZZ/Zkdxz0WJpjq2dYHN7zwMP+nGIA42/c8LsoP70 dUb8Q7o9RijwDz+Sap6UVe5IO9xgsggXPSzhGV9zOTFxKlvC51xHVKEeihDpzdlp eJrWlS6f/qb3nXImvp7tL1B19hDrXr7Nd4Qi9G6ommgC+8GzHyWunKxPCmjrzN9j w3fFPi4j/A4OjEwf+xNldxwOgloVnZi6XNNjQl2xHAgFSI8782kFrz8pv9+tvTM7 lMtFGhXQNiAGdQBbuAj/6dXY212S4i9N6hyyxZryHatO0+kigHbqON9CCX2JgqUM h26RGwPvqJtZpo8oF9IsfTDxwRuJTnerCYuAjCjbC5bydMXXgb+WtiYkR0/Vd/oA Ji0auL7HwssdlwM+ItUFxqlIMAmxTA5w9A08VjQUPdIZ2WN4GOXFN9EMi1iU1NtN UUFtQEnLAhs= =SsDe -----END PGP SIGNATURE-----