Lucene search

K
kasperskyKaspersky LabKLA11049
HistoryJun 13, 2017 - 12:00 a.m.

KLA11049 Multiple vulnerabilities in Microsoft Office

2017-06-1300:00:00
Kaspersky Lab
threats.kaspersky.com
90

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

AI Score

8.4

Confidence

High

EPSS

0.407

Percentile

97.4%

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. An improper validating of input before loading DLL (dynamic link library) files can be exploited remotely by convincing a user to open a specially designed office document to execute arbitrary code;
  2. An improper parsing of email messages can be exploited remotely by sending a specially designed email message and convincing a user to open it to execute arbitrary code;
  3. An incorrect handling of parsing of file formats can be exploited remotely by convincing a user to open a specially designed file to bypass security restrictions;
  4. Multiple vulnerabities related to an improper handling of objects in memory can be exploited remotely by sending a specially designed file via email and convincing a user to open it or by hosting a website which contains a malicious file and convince a user to open website to execute arbitrary code;
  5. An incorrect validation and sanitizing of html input in Microsoft Outlook for Mac can be exploited remotely via a specially designed email with specific HTML tags to spoof user interface and show a malicious authentication prompt.

Original advisories

ADV170008

CVE-2017-8513

CVE-2017-8512

CVE-2017-8511

CVE-2017-8510

CVE-2017-8506

CVE-2017-8507

CVE-2017-8508

CVE-2017-8545

CVE-2017-8509

CVE-2017-0284

CVE-2017-8528

CVE-2017-0292

CVE-2017-0285

CVE-2017-8534

CVE-2017-0283

CVE-2017-8550

CVE-2017-0282

CVE-2017-0260

CVE-2017-8509

CVE-2017-0286

CVE-2017-0287

CVE-2017-0288

CVE-2017-0289

CVE-2017-8527

CVE-2017-8531

CVE-2017-8532

CVE-2017-8533

CVE-2017-8506

CVE-2017-8507

CVE-2017-8508

CVE-2017-8510

CVE-2017-8511

CVE-2017-8512

CVE-2017-8513

CVE-2017-8545

CVE-2017-8551

CVE-2017-8514

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office-Compatibility-Pack-for-Word,-Excel,-and-PowerPoint-2007-File-Formats

Microsoft-Office-PowerPoint

Microsoft-Office

Microsoft-Outlook

Microsoft-Word

Microsoft-Sharepoint-Server

CVE list

CVE-2017-0284 warning

CVE-2017-8528 critical

CVE-2017-0292 critical

CVE-2017-0285 warning

CVE-2017-8534 warning

CVE-2017-0283 critical

CVE-2017-8550 warning

CVE-2017-0282 warning

CVE-2017-0260 critical

CVE-2017-8509 critical

CVE-2017-0286 warning

CVE-2017-0287 warning

CVE-2017-0288 warning

CVE-2017-0289 warning

CVE-2017-8527 critical

CVE-2017-8531 warning

CVE-2017-8532 warning

CVE-2017-8533 warning

CVE-2017-8506 critical

CVE-2017-8507 critical

CVE-2017-8508 warning

CVE-2017-8510 critical

CVE-2017-8511 critical

CVE-2017-8512 critical

CVE-2017-8513 critical

CVE-2017-8545 warning

CVE-2017-8551 warning

CVE-2017-8514 warning

KB list

3203391

3203393

3191882

3203427

4020732

4020733

4020735

4020736

3178667

3203432

3203484

3203485

4020734

3191837

3162051

3203438

3191939

3203430

3203436

3203386

3203382

3212223

3203458

3118389

3191848

3191943

3191945

3191944

3191828

3203441

3191844

3203466

3203464

3203463

3203460

3191908

3203390

3203392

3172445

3191932

3191938

3127888

3203384

3203383

3191898

3127894

3118304

3203467

3203461

3203387

3213537

3203399

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Office 2007 Service Pack 3Microsoft Office 2010 Service Pack 2Microsoft Office 2013 Service Pack 1Microsoft Office 2016Microsoft Office Compatibility Pack Service Pack 3Microsoft PowerPoint 2007 Service Pack 3Microsoft OneNote 2010 Service Pack 2 Microsoft Outlook 2007 Service Pack 3Microsoft Outlook 2010 Service Pack 2Microsoft Outlook 2013 RT Service Pack 1Microsoft Outlook 2013 Service Pack 1Microsoft Outlook 2016Microsoft SharePoint Server 2007 Service Pack 3Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft Word 2007 Service Pack 3Microsoft Word 2010 Service Pack 2Microsoft Word 2013 RT Service Pack 1Microsoft Word 2013 Service Pack 1Microsoft Word 2016Microsoft Word for Mac 2011Microsoft Word 2016 for Mac

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

AI Score

8.4

Confidence

High

EPSS

0.407

Percentile

97.4%