Microsoft released security bulletin MS14-058 for this issue. The update addresses a remote code execution vulnerability in Microsoft SharePoint Foundation, Microsoft SharePoint Server, Microsoft SharePoint Server 2010, and Microsoft SharePoint Server 2013. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

In order to successfully exploit this vulnerability, an attacker must be able to access the SharePoint server, such as when a user clicks on a malicious link sent in an email. End users who visit a malicious website or open a malicious email could be exploited.
An attacker could host a specially crafted website, or use a specially crafted Microsoft Office program or Microsoft SharePoint Server Web Application to try to exploit the vulnerability. These applications could attempt to exploit the vulnerability by running a remote code attack against the target system. In some cases, this may require the user to click on a link or open a specially crafted document.

In all cases, users should be vigilant regarding emails asking them to open documents or click on links. Microsoft Active Protections Program The Microsoft Active Protections Program (MAPP) is a security software assurance program that helps IT professionals protect their devices from security vulnerabilities by scanning for software assurance weaknesses

^Back to top

Because of the complexity of SEO, many small businesses choose to outsource part or all of their SEO strategy. This is a great way to avoid the complexities and costs associated with a full-blown strategy while still achieving maximum results.


This Microsoft SharePoint bulletin outlines a remote code execution vulnerability that could allow attackers to take complete control of the affected system. This update provides the following protections:

* The update will be applied automatically when users restart their systems and it is not required for an administrator to apply the update.

* Users are no longer able to browse or open files from untrusted locations.

Microsoft Office

Could Be Used to Try and Exploit the Vulnerability
Microsoft Office could be used to try and exploit this vulnerability. In order to exploit this vulnerability, an attacker would need to trick a user into visiting a malicious website or open a malicious document.
It is also possible for an attacker to use another application on a system that was installed with the vulnerable software and then convince the user to visit a malicious website or open a malicious document in that application.

How Does This Get Exploited?

This issue can be exploited by visiting a malicious website or clicking on a link in an email.
In the case of the malicious website, the user visits a website that hosts the exploit code with vulnerabilities for this vulnerability. If successful, the exploit will run and take complete control of the system. On Microsoft SharePoint servers, users click on a link or open a document containing an exploit for this vulnerability that runs without user interaction. These exploits could come from websites hosting them or from email attachments with links to malware.


Published on: 11/09/2022 22:15:00 UTC
Last modified on: 11/14/2022 18:21:00 UTC