Description
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface and obtain sensitive information.
Below is a complete list of vulnerabilities:
- Elevation of privilege vulnerabilities in Microsoft SharePoint Server can be exploited remotely via specially crafted web request to gain privileges or obtain sensitive information;
- Improper email parsing vulnerabilities in Microsoft Outlook can be exploited remotely via specially crafted email messages to execute arbitrary code;
- Improper memory handling vulnerabilities in Microsoft Word can be exploited remotely to execute arbitrary code;
- Improper memory handling vulnerabilities in Microsoft Office software can be exploited remotely to execute arbitrary code;
- Improper memory handling vulnerabilities in Microsoft Excel can be exploited remotely to execute arbitrary code;
- A memory corruption vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code;
- A XSS vulnerability in Microsoft Access can be exploited remotely via specially crafted file to spoof user interface;
- A memory corruption vulnerability in Microsoft Office software can be exploited remotely via specially crafted file to execute arbitrary code;
- An email encoding handling vulnerability in Microsoft Outlook for MAC can be exploited remotely via specially crafted email attachment to spoof user interface.
Original advisories
- CVE-2018-0789
- CVE-2018-0790
- CVE-2018-0793
- CVE-2018-0791
- CVE-2018-0792
- CVE-2018-0794
- CVE-2018-0795
- CVE-2018-0796
- CVE-2018-0797
- CVE-2018-0798
- CVE-2018-0799
- CVE-2018-0801
- CVE-2018-0802
- CVE-2018-0804
- CVE-2018-0805
- CVE-2018-0806
- CVE-2018-0807
- CVE-2018-0812
- CVE-2018-0819
Exploitation
This vulnerability can be exploited by the following malware:
https://threats.kaspersky.com/en/threat/Exploit.MSOffice.CVE-2018-0802/
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2018-0789 critical
- CVE-2018-0790 critical
- CVE-2018-0793 critical
- CVE-2018-0791 critical
- CVE-2018-0792 critical
- CVE-2018-0794 critical
- CVE-2018-0795 critical
- CVE-2018-0796 critical
- CVE-2018-0797 critical
- CVE-2018-0798 critical
- CVE-2018-0799 high
- CVE-2018-0801 critical
- CVE-2018-0802 critical
- CVE-2018-0804 critical
- CVE-2018-0805 critical
- CVE-2018-0806 critical
- CVE-2018-0807 critical
- CVE-2018-0812 critical
- CVE-2018-0819 high
KB list
- 4011602
- 4011605
- 4011627
- 4011660
- 4011639
- 4011606
- 4011636
- 4011201
- 4011622
- 4011611
- 4011642
- 3114998
- 4011653
- 4011651
- 3141547
- 4011213
- 4011626
- 4011273
- 4011637
- 4011643
- 4011607
- 4011658
- 4011657
- 4011659
- 4011632
- 4011648
- 4011615
- 4011641
- 4011609
- 4011579
- 4011580
- 4011656
- 4011574
- 4011610
- 4011599
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!