Lucene search

K
kasperskyKaspersky LabKLA11170
HistoryJan 09, 2018 - 12:00 a.m.

KLA11170 Multiple vulnerabilities in Microsoft Office

2018-01-0900:00:00
Kaspersky Lab
threats.kaspersky.com
436

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.968

Percentile

99.7%

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Elevation of privilege vulnerabilities in Microsoft SharePoint Server can be exploited remotely via specially crafted web request to gain privileges or obtain sensitive information;
  2. Improper email parsing vulnerabilities in Microsoft Outlook can be exploited remotely via specially crafted email messages to execute arbitrary code;
  3. Improper memory handling vulnerabilities in Microsoft Word can be exploited remotely to execute arbitrary code;
  4. Improper memory handling vulnerabilities in Microsoft Office software can be exploited remotely to execute arbitrary code;
  5. Improper memory handling vulnerabilities in Microsoft Excel can be exploited remotely to execute arbitrary code;
  6. A memory corruption vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code;
  7. A XSS vulnerability in Microsoft Access can be exploited remotely via specially crafted file to spoof user interface;
  8. A memory corruption vulnerability in Microsoft Office software can be exploited remotely via specially crafted file to execute arbitrary code;
  9. An email encoding handling vulnerability in Microsoft Outlook for MAC can be exploited remotely via specially crafted email attachment to spoof user interface.

Original advisories

ADV180003

CVE-2018-0789

CVE-2018-0790

CVE-2018-0793

CVE-2018-0791

CVE-2018-0792

CVE-2018-0794

CVE-2018-0795

CVE-2018-0796

CVE-2018-0797

CVE-2018-0798

CVE-2018-0799

CVE-2018-0801

CVE-2018-0802

CVE-2018-0804

CVE-2018-0805

CVE-2018-0806

CVE-2018-0807

CVE-2018-0812

CVE-2018-0819

Exploitation

This vulnerability can be exploited by the following malware:

https://threats.kaspersky.com/en/threat/Exploit.MSOffice.CVE-2018-0802/

Public exploits exist for this vulnerability.

Related products

Microsoft-Office

Microsoft-Outlook

Microsoft-Excel

Microsoft-Word

CVE list

CVE-2018-0789 critical

CVE-2018-0790 critical

CVE-2018-0793 critical

CVE-2018-0791 critical

CVE-2018-0792 critical

CVE-2018-0794 critical

CVE-2018-0795 critical

CVE-2018-0796 critical

CVE-2018-0797 critical

CVE-2018-0798 critical

CVE-2018-0799 high

CVE-2018-0801 critical

CVE-2018-0802 critical

CVE-2018-0804 critical

CVE-2018-0805 critical

CVE-2018-0806 critical

CVE-2018-0807 critical

CVE-2018-0812 critical

CVE-2018-0819 high

KB list

4011602

4011605

4011627

4011660

4011639

4011606

4011636

4011201

4011622

4011611

4011642

3114998

4011653

4011651

3141547

4011213

4011626

4011273

4011637

4011643

4011607

4011658

4011657

4011659

4011632

4011648

4011615

4011641

4011609

4011579

4011580

4011656

4011574

4011610

4011599

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Excel 2007 Service Pack 3Microsoft Excel 2010 Service Pack 2Microsoft Excel 2013 RT Service Pack 1Microsoft Excel 2013 Service Pack 1Microsoft Excel 2016Microsoft Excel 2016 Click-to-Run (C2R)Microsoft Excel Viewer 2007 Service Pack 3Microsoft Office 2007 Service Pack 3Microsoft Office 2010 Service Pack 2Microsoft Office 2013 RT Service Pack 1Microsoft Office 2013 Service Pack 1Microsoft Office 2016Microsoft Office 2016 Click-to-Run (C2R)Microsoft Office 2016 for MacMicrosoft Office Compatibility Pack Service Pack 3Microsoft Office Online Server 2016Microsoft Office Web Apps 2010 Service Pack 2Microsoft Office Web Apps Server 2013 Service Pack 1Microsoft Office Word ViewerMicrosoft Outlook 2007 Service Pack 3Microsoft Outlook 2010 Service Pack 2Microsoft Outlook 2013 RT Service Pack 1Microsoft Outlook 2013 Service Pack 1Microsoft Outlook 2016Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2010 Service Pack 2Microsoft SharePoint Server 2010 Service Pack 2Microsoft Word 2007 Service Pack 3Microsoft Word 2010 Service Pack 2Microsoft Word 2013 RT Service Pack 1Microsoft Word 2013 Service Pack 1Microsoft Word 2016

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.968

Percentile

99.7%