Kaspersky ID:
KLA11349
Detekováno:
11/13/2018
Aktualizováno:
01/22/2024

Popis

Multiple serious vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted email to execute arbitrary code.
  2. A vulnerability in Microsoft Outlook can be exploited remotely via specially designed e-mail to obtain sensitive information.
  3. A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
  4. A vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web request to gain privileges.
  5. A vulnerability in Microsoft SharePoint can be exploited remotely via specially designed request to gain privileges.
  6. A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
  7. A vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code.
  8. A vulnerability in Microsoft Skype for Business can be exploited remotely via specially designed e-mail to cause denial of service.
  9. A vulnerability in Microsoft Outlook can be exploited remotely via specially designed e-mail to obtain sensitive information.
  10. A vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code.
  11. A vulnerability in Microsoft Project can be exploited remotely via specially crafted file to execute arbitrary code.
  12. A vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
  13. A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
  14. A vulnerability in Microsoft SharePoint can be exploited remotely via specially designed request to obtain sensitive information.
  15. A vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.

Oficiální doporučení

Vykořisťování

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Související produkty

seznam CVE

  • CVE-2018-8582
    critical
  • CVE-2018-8558
    warning
  • CVE-2018-8576
    critical
  • CVE-2018-8568
    warning
  • CVE-2018-8572
    warning
  • CVE-2018-8522
    critical
  • CVE-2018-8539
    critical
  • CVE-2018-8546
    warning
  • CVE-2018-8579
    warning
  • CVE-2018-8573
    critical
  • CVE-2018-8575
    critical
  • CVE-2018-8574
    critical
  • CVE-2018-8524
    critical
  • CVE-2018-8578
    warning
  • CVE-2018-8577
    critical

seznam KB

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.