Lucene search

K
kasperskyKaspersky LabKLA11225
HistoryApr 10, 2018 - 12:00 a.m.

KLA11225 Multiple vulnerabilities in Microsoft Office

2018-04-1000:00:00
Kaspersky Lab
threats.kaspersky.com
264

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.293 Low

EPSS

Percentile

96.9%

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An improper font handling in the Office graphics component can be exploited remotely via specially crafted document or website to execute arbitrary code;
  2. An unspecified vulnerability can be exploited remotely via specially crafted RTF document to obtain sensitive information;
  3. Multiple vulnerabilities related to improper request handling in Microsoft SharePoint Server can be exploited remotely via specially crafted URL to gain privileges;
  4. Multiple memory corruption vulnerabilities in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code;
  5. Multiple memory corruption vulnerabilities in Microsoft Office can be exploited remotely via specially crafted file to execute arbitrary code;
  6. An unspecified vulnerability can be exploited remotely via specially crafted document to obtain sensitive information.

Original advisories

CVE-2018-1028

CVE-2018-0950

CVE-2018-1014

CVE-2018-1034

CVE-2018-1027

CVE-2018-1029

CVE-2018-1032

CVE-2018-1030

CVE-2018-1026

CVE-2018-1005

CVE-2018-1011

CVE-2018-1007

CVE-2018-0920

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office-Compatibility-Pack-for-Word,-Excel,-and-PowerPoint-2007-File-Formats

Microsoft-Office

Microsoft-Excel

Microsoft-Word

CVE list

CVE-2018-1028 critical

CVE-2018-0950 warning

CVE-2018-1014 warning

CVE-2018-1034 warning

CVE-2018-1027 critical

CVE-2018-1029 critical

CVE-2018-1032 warning

CVE-2018-1030 critical

CVE-2018-1026 critical

CVE-2018-1005 warning

CVE-2018-1011 critical

CVE-2018-1007 warning

CVE-2018-0920 critical

KB list

4018355

4018311

4018357

4018344

4018341

4018350

4018354

4018360

4018362

4018319

4011628

4018342

4011586

4011717

4018337

4011719

4018339

4018328

4018356

4011712

4018359

4018347

4018353

4018343

4018336

4018288

4018330

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft Excel 2010 Service Pack 2Microsoft Office 2016Microsoft Excel 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft Office 2013 Service Pack 1Microsoft Office 2016 Click-to-RunMicrosoft SharePoint Server 2010 Service Pack 2Microsoft Excel 2016 Click-to-RunMicrosoft Excel 2007 Service Pack 3Microsoft Excel 2010 Service Pack 2Microsoft Excel 2016Microsoft Excel Viewer 2007 Service Pack 3Microsoft Office Compatibility Pack Service Pack 3Microsoft Office 2016 for MacMicrosoft Office 2010 Service Pack 2Microsoft Word 2007 Service Pack 3Microsoft Word 2010 Service Pack 2Microsoft Word 2013 Service Pack 1Microsoft Word 2016Word Automation Services

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.293 Low

EPSS

Percentile

96.9%