#Excel mac os x 10.12.3 updateThe company says it is in the process of developing a security update to address this vulnerability.Īs a stop-gap solution, the company recommends that users do not open or save Office files received from un-trusted sources or those received unexpectedly from trusted sources. "In an e-mail attack scenario, an attacker could exploit the vulnerability by sending a specially-crafted file to the user and by persuading the user to open the file." Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker's site. In addition, compromised Web sites and Web sites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability An attacker would have no way to force users to visit a malicious Web site. "In a Web-based attack scenario, an attacker would have to host a Web site that contains a Office file that is used to attempt to exploit this vulnerability. Specifically, this flaw can be exploited when the victim user opens a specially crafted Office file using a malformed string that can corrupt system memory, potentiating execution of arbitrary code. #Excel mac os x 10.12.3 for mac
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |