Lucene search

K
kasperskyKaspersky LabKLA11180
HistoryJan 09, 2018 - 12:00 a.m.

KLA11180 Multiple vulnerabilities in Microsoft Office Online

2018-01-0900:00:00
Kaspersky Lab
threats.kaspersky.com
46

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.099

Percentile

94.9%

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Remote code execution vulnerability in Microsoft Office software can be exploited via specially crafted file to execute arbitrary code;
  2. Memory corruption vulnerability in Microsoft Office software can be exploited via specially crafted file to execute arbitrary code.

Technical details

Vulnerability (1) is related to Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editions, Microsoft Office 2016 Click-to-Run (C2R) for 64-bit editions, Microsoft Office 2016 for Mac, Microsoft Office Online Server 2016, Microsoft SharePoint Enterprise Server 2016, Microsoft Word 2016 (32-bit edition), Microsoft Word 2016 (64-bit edition).

Original advisories

CVE-2018-0792

CVE-2018-0797

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Word

Microsoft-Sharepoint-Server

CVE list

CVE-2018-0792 critical

CVE-2018-0797 critical

KB list

4011022

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editionsMicrosoft Office 2016 Click-to-Run (C2R) for 64-bit editionsMicrosoft Office 2016 for MacMicrosoft Office Online Server 2016Microsoft SharePoint Enterprise Server 2016Microsoft Word 2016 (32-bit edition)Microsoft Word 2016 (64-bit editionMicrosoft Office 2010 Service Pack 2 (32-bit editions)Microsoft Office 2010 Service Pack 2 (64-bit editions)Microsoft Office Compatibility Pack Service Pack 3Microsoft Office Web Apps 2010 Service Pack 2Microsoft Office Web Apps Server 2013 Service Pack 1Microsoft Office Word ViewerMicrosoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Server 2010 Service Pack 2Microsoft Word 2007 Service Pack 3Microsoft Word 2010 Service Pack 2 (32-bit editions)Microsoft Word 2010 Service Pack 2 (64-bit editions)Microsoft Word 2013 RT Service Pack 1Microsoft Word 2013 Service Pack 1 (32-bit editions)Microsoft Word 2013 Service Pack 1 (64-bit editions)

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.099

Percentile

94.9%