Lucene search

K
kasperskyKaspersky LabKLA11080
HistoryJul 27, 2017 - 12:00 a.m.

KLA11080 Multiple vulnerabilities in Microsoft Office

2017-07-2700:00:00
Kaspersky Lab
threats.kaspersky.com
62

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.246 Low

EPSS

Percentile

96.7%

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An improper handling of input in Microsoft Office Outlook can be exploited via a specially designed document file to bypass security restrictions;
  2. An incorrect disclosure the contents of memory in Microsoft Office can be exploited via a specially designed document file to obtain sensitive information;
  3. An improper parsing of email messages in Microsoft Outlook can be exploited by sending a specially designed file to the user and then convincing the user to open the file to execute arbitrary code.

Original advisories

CVE-2017-8571

CVE-2017-8663

CVE-2017-8572

CVE-2017-8572

CVE-2017-8663

Related products

Microsoft-Office

Microsoft-Outlook

CVE list

CVE-2017-8571 high

CVE-2017-8572 warning

CVE-2017-8663 critical

KB list

2956078

3213643

4011052

4011078

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Office 2010 Click-to-RunMicrosoft Office 2013 Click-to-RunMicrosoft Office 2016 Click-to-RunMicrosoft Outlook 2007 Service Pack 3Microsoft Outlook 2010 Service Pack 2Microsoft Outlook 2013 RT Service Pack 1Microsoft Outlook 2013 Service Pack 1Microsoft Outlook 2016

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.246 Low

EPSS

Percentile

96.7%