cancel
Showing results for 
Search instead for 
Did you mean: 
ed87
Level 7
Report Inappropriate Content
Message 1 of 3

MS Office Vulnerabilities Detected on Servers without Office

Jump to solution

We have numerous servers that have Word, Excel, and other Office vulnerabilities detected by MVM, but they do not have Office installed.  All they have is the 2007 Office Compatibility Pack.

1 Solution

Accepted Solutions
Highlighted
cgrim
Level 13
Report Inappropriate Content
Message 2 of 3

Re: MS Office Vulnerabilities Detected on Servers without Office

Jump to solution

Hi Ed,


It all comes down to the specific vulnerability MVM Is reporting.  Most of the time you can check the Microsoft KB article, and it may list the Compatibility Pack as vulnerable.  Regardless, if the Vulnerable versions of the various files are distributed in the Compatibility Pack, they are exploitable regardless if you're running the actual applications - which is why MVM flags the system as Vulnerable.

I hope that helps!
Cathy

2 Replies
Highlighted
cgrim
Level 13
Report Inappropriate Content
Message 2 of 3

Re: MS Office Vulnerabilities Detected on Servers without Office

Jump to solution

Hi Ed,


It all comes down to the specific vulnerability MVM Is reporting.  Most of the time you can check the Microsoft KB article, and it may list the Compatibility Pack as vulnerable.  Regardless, if the Vulnerable versions of the various files are distributed in the Compatibility Pack, they are exploitable regardless if you're running the actual applications - which is why MVM flags the system as Vulnerable.

I hope that helps!
Cathy

Re: MS Office Vulnerabilities Detected on Servers without Office

Jump to solution

To further add to what Cathy said-this is normal. Often times office/software vulnerabilities are vulnerable because a shared library file is vulnerable, such as a DLL. If your system has the vulnerable version of the shared file it comes back as vulnerable until you remove that component or somehow update it.

Don't be fooled by the vulnerability titles/names-they are just extracted from the original way the vulnerability was reported-it all ties in with the cve database/OVAL in some form.

More McAfee Tools to Help You
  • Subscription Service Notification (SNS)
  • How-to: Endpoint Removal Tool
  • Support: Endpoint Security
  • eSupport: Policy Orchestrator
  • Community Help Hub

      New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

    • Find Forum FAQs
    • Learn How to Earn Badges
    • Ask for Help
    Go to Community Help

    Join the Community

      Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

    • Get helpful solutions from McAfee experts.
    • Stay connected to product conversations that matter to you.
    • Participate in product groups led by McAfee employees.
    Join the Community
    Join the Community