Kaspersky ID:
KLA11113
Detect Date:
10/10/2017
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information perform cross-site scripting and privilege escalations Below is a complete list of vulnerabilities:

  1. Multiple vulnerabilities related to an improper handling of objects in memory in Microsoft Office can be exploited locally via a specially designed file to execute arbitrary code;
  2. Multiple vulnerabilities in Microsoft SharePoint can be exploited remotely via specially designed web request to perform cross-site scripting;
  3. A vulnerability in Microsoft Outlook can be exploited via specially crafted document file to execute arbitrary code;
  4. A vulnerability in Microsoft Outlook can be exploited remotely to obtain sensitive information;
  5. A vulnerability in Skype for Business can be exploited remotely via specially designed authentication request to cause privilage escalation.

Technical details

NB: Not every vulnerability already has CVSS rating, so cumulative CVSS rating can be not representative. NB: At this moment VENDOR has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2017-11774
    high
  • CVE-2017-11775
    warning
  • CVE-2017-11776
    warning
  • CVE-2017-11777
    warning
  • CVE-2017-11786
    critical
  • CVE-2017-11820
    warning
  • CVE-2017-11825
    critical
  • CVE-2017-11826
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.