Description
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to execute arbitrary code.
Below is a complete list of vulnerabilities:
- An improper validation of input before loading DLL files can be exploited remotely via a specially designed office document to execute arbitrary code;
- An incorrect parsing of files can be exploited locally via a specially designed file or remotely via email containg specially designed office document to execute arbitrary code.
Technical details
Vulnerability (1) exists in Microsoft OneNote products from the list; vulnerability (2) exists in the rest of the affected products list.
Original advisories
Exploitation
This vulnerability can be exploited by the following malware:
https://threats.kaspersky.com/en/threat/Exploit.MSOffice.CVE-2017-0199/
https://threats.kaspersky.com/en/threat/Exploit.MSOffice.Oleink/
https://threats.kaspersky.com/en/threat/Trojan.Win32.FormBook/
https://threats.kaspersky.com/en/threat/Trojan-PSW.Win32.Azorult/
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2017-0197 critical
- CVE-2017-0199 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com