Description
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- An incorrect handling of objects in memory in certain functions can be exploited remotely by convincing a user to open a specially designed document file;
- An improper sanitizing of web requests can be exploited remotely by sending an email message or hosting a website with a specially designed URL and convincing a user to open it to gain privileges;
- An incorrect parsing of file formats can be exploited remotely by convincing a user to open a specially designed file to bypass security restrictions;
- An improper sanitizing of HTML tags can be exploited remotely by sending an email message with specially disigned HTML tags to spoof user interface;
- An improper parsing of email messages can be exploited remotely by convincing a user to open or preview a specially designed email message to execute arbitrary code.
Original advisories
- CVE-2017-0195
- CVE-2017-0204
- CVE-2017-0194
- CVE-2017-0106
- CVE-2017-0194
- CVE-2017-0195
- CVE-2017-0207
- CVE-2017-0204
- CVE-2017-0106
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Office-Compatibility-Pack-for-Word,-Excel,-and-PowerPoint-2007-File-Formats
- Microsoft-Office
- Microsoft-Outlook
- Microsoft-Excel
CVE list
- CVE-2017-0194 high
- CVE-2017-0195 high
- CVE-2017-0207 high
- CVE-2017-0204 high
- CVE-2017-0106 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!