9.3
CVE-2017-11826
- EPSS 89.65%
- Published 13.10.2017 13:29:02
- Last modified 20.04.2025 01:37:25
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Office Compatibility Pack Version- Updatesp3
Microsoft ≫ Office Online Server Version2016
Microsoft ≫ Office Web Apps Server Version2010 Updatesp2
Microsoft ≫ Office Web Apps Server Version2013 Updatesp1
Microsoft ≫ Office Word Viewer Version-
Microsoft ≫ Sharepoint Enterprise Server Version2016
Microsoft ≫ Sharepoint Server Version2010 Updatesp2
Microsoft ≫ Sharepoint Server Version2013 Updatesp1
03.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Office Remote Code Execution Vulnerability
VulnerabilityA remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 89.65% | 0.995 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.