Description
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- An incorrect handling of objects in memory in certain functions can be exploited remotely by convincing a user to open a specially designed document file;
- An improper sanitizing of web requests can be exploited remotely by sending an email message or hosting a website with a specially designed URL and convincing a user to open it to gain privileges;
- An incorrect parsing of file formats can be exploited remotely by convincing a user to open a specially designed file to bypass security restrictions;
- An improper sanitizing of HTML tags can be exploited remotely by sending an email message with specially disigned HTML tags to spoof user interface;
- An improper parsing of email messages can be exploited remotely by convincing a user to open or preview a specially designed email message to execute arbitrary code.
Original advisories
- CVE-2017-0195
- CVE-2017-0204
- CVE-2017-0194
- CVE-2017-0106
- CVE-2017-0194
- CVE-2017-0195
- CVE-2017-0207
- CVE-2017-0204
- CVE-2017-0106
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Office-Compatibility-Pack-for-Word,-Excel,-and-PowerPoint-2007-File-Formats
- Microsoft-Office
- Microsoft-Outlook
- Microsoft-Excel
CVE list
- CVE-2017-0194 warning
- CVE-2017-0195 warning
- CVE-2017-0207 warning
- CVE-2017-0204 warning
- CVE-2017-0106 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!