Lucene search

K
kasperskyKaspersky LabKLA11183
HistoryJan 19, 2018 - 12:00 a.m.

KLA11183 Memory corruption vulnerabilities in Microsoft Office

2018-01-1900:00:00
Kaspersky Lab
threats.kaspersky.com
94

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.166

Percentile

96.1%

Memory corruption vulnerabilities was found in Microsoft Office software. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited via specially crafted file to execute arbitrary code.

Original advisories

CVE-2018-0849

CVE-2018-0862

CVE-2018-0848

CVE-2018-0845

Related products

Microsoft-Office

Microsoft-Word

CVE list

CVE-2018-0849 critical

CVE-2018-0862 critical

CVE-2018-0848 critical

CVE-2018-0845 critical

KB list

4011651

4011643

4011607

4011657

4011659

4011656

4011574

4011610

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Microsoft Office 2007 Service Pack 3Microsoft Office 2010 Service Pack 2 (32-bit editions)Microsoft Office 2010 Service Pack 2 (64-bit editions)Microsoft Office 2013 Service Pack 1 (32-bit editions)Microsoft Office 2013 Service Pack 1 (64-bit editions)Microsoft Office 2016 (32-bit edition)Microsoft Office 2016 (64-bit edition)Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editionsMicrosoft Office 2016 Click-to-Run (C2R) for 64-bit editionsMicrosoft Office Compatibility Pack Service Pack 3Microsoft Word 2007 Service Pack 3Microsoft Word 2010 Service Pack 2 (32-bit editions)Microsoft Word 2010 Service Pack 2 (64-bit editions)Microsoft Word 2013 RT Service Pack 1Microsoft Word 2013 Service Pack 1 (32-bit editions)Microsoft Word 2013 Service Pack 1 (64-bit editions)Microsoft Word 2016 (32-bit edition)Microsoft Word 2016 (64-bit edition)

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.166

Percentile

96.1%