Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- An incorrect handling of objects in memory in certain functions can be exploited remotely by convincing a user to open a specially designed document file;
- An improper sanitizing of web requests can be exploited remotely by sending an email message or hosting a website with a specially designed URL and convincing a user to open it to gain privileges;
- An incorrect parsing of file formats can be exploited remotely by convincing a user to open a specially designed file to bypass security restrictions;
- An improper sanitizing of HTML tags can be exploited remotely by sending an email message with specially disigned HTML tags to spoof user interface;
- An improper parsing of email messages can be exploited remotely by convincing a user to open or preview a specially designed email message to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2017-0195
- CVE-2017-0204
- CVE-2017-0194
- CVE-2017-0106
- CVE-2017-0194
- CVE-2017-0195
- CVE-2017-0207
- CVE-2017-0204
- CVE-2017-0106
CVE Liste
- CVE-2017-0194 critical
- CVE-2017-0195 critical
- CVE-2017-0207 critical
- CVE-2017-0204 critical
- CVE-2017-0106 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!