9.3

CVE-2017-11826

Warning
Exploit

Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.

Data is provided by the National Vulnerability Database (NVD)
MicrosoftOffice Compatibility Pack Version- Updatesp3
MicrosoftOffice Web Apps Server Version2010 Updatesp2
MicrosoftOffice Web Apps Server Version2013 Updatesp1
MicrosoftSharepoint Server Version2010 Updatesp2
MicrosoftSharepoint Server Version2013 Updatesp1
MicrosoftWord Version2007 Updatesp3
MicrosoftWord Version2010 Updatesp2
MicrosoftWord Version2013 Updatesp1 SwEdition-
MicrosoftWord Version2013 Updatesp1 SwEditionrt
MicrosoftWord Version2016

03.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Office Remote Code Execution Vulnerability

Vulnerability

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 89.65% 0.995
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.