9.3
CVE-2017-11826
- EPSS 89.65%
- Veröffentlicht 13.10.2017 13:29:02
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Office Compatibility Pack Version- Updatesp3
Microsoft ≫ Office Online Server Version2016
Microsoft ≫ Office Web Apps Server Version2010 Updatesp2
Microsoft ≫ Office Web Apps Server Version2013 Updatesp1
Microsoft ≫ Office Word Viewer Version-
Microsoft ≫ Sharepoint Enterprise Server Version2016
Microsoft ≫ Sharepoint Server Version2010 Updatesp2
Microsoft ≫ Sharepoint Server Version2013 Updatesp1
03.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Office Remote Code Execution Vulnerability
SchwachstelleA remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 89.65% | 0.995 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.