Lucene search

K
cveMicrosoftCVE-2018-8244
HistoryJun 14, 2018 - 12:29 p.m.

CVE-2018-8244

2018-06-1412:29:02
CWE-20
microsoft
web.nvd.nist.gov
70
cve-2018-8244
elevation of privilege
microsoft outlook
microsoft office
nvd

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6.4

Confidence

High

EPSS

0.003

Percentile

70.8%

An elevation of privilege vulnerability exists when Microsoft Outlook does not validate attachment headers properly, aka “Microsoft Outlook Elevation of Privilege Vulnerability.” This affects Microsoft Office, Microsoft Outlook.

Affected configurations

Nvd
Vulners
Node
microsoftofficeMatch2016click-to-run
OR
microsoftoutlookMatch2010sp2
OR
microsoftoutlookMatch2013sp1
OR
microsoftoutlookMatch2016
OR
microsoftoutlook_rtMatch2013sp1
VendorProductVersionCPE
microsoftoffice2016cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*
microsoftoutlook2010cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*
microsoftoutlook2013cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*
microsoftoutlook2016cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*
microsoftoutlook_rt2013cpe:2.3:a:microsoft:outlook_rt:2013:sp1:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Microsoft Office",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "2016 Click-to-Run (C2R) for 32-bit editions"
      },
      {
        "status": "affected",
        "version": "2016 Click-to-Run (C2R) for 64-bit editions"
      }
    ]
  },
  {
    "product": "Microsoft Outlook",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "2010 Service Pack 2 (32-bit editions)"
      },
      {
        "status": "affected",
        "version": "2010 Service Pack 2 (64-bit editions)"
      },
      {
        "status": "affected",
        "version": "2013 RT Service Pack 1"
      },
      {
        "status": "affected",
        "version": "2013 Service Pack 1 (32-bit editions)"
      },
      {
        "status": "affected",
        "version": "2013 Service Pack 1 (64-bit editions)"
      },
      {
        "status": "affected",
        "version": "2016 (32-bit edition)"
      },
      {
        "status": "affected",
        "version": "2016 (64-bit edition)"
      }
    ]
  }
]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6.4

Confidence

High

EPSS

0.003

Percentile

70.8%