Kaspersky ID:
KLA11319
検出日:
09/11/2018
更新日:
01/28/2026

説明

Multiple serious vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, bypass security restrictions, gain privileges. Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Microsoft Office SharePoint can be exploited remotely via specially crafted web request to obtain sensitive information.
  2. A remote code execution vulnerability in Microsoft Office Excel can be exploited remotely via specially crafted file to execute arbitrary code.
  3. A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
  4. A remote code execution vulnerability in Microsoft Word can be exploited remotely via specially crafted PDF file to execute arbitrary code.
  5. An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
  6. A security feature bypass vulnerability in Lync can be exploited remotely via specially crafted messages to bypass security restrictions.
  7. An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web request to gain priveleges.
  8. An information disclosure vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web request to obtain sensitive information.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

関連製品

CVEリスト

  • CVE-2018-8332
    critical
  • CVE-2018-8426
    high
  • CVE-2018-8331
    critical
  • CVE-2018-8430
    critical
  • CVE-2018-8429
    high
  • CVE-2018-8474
    critical
  • CVE-2018-8428
    high
  • CVE-2018-8431
    high

KBリスト

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.