Kaspersky ID:
KLA12389
Дата обнаружения:
14/12/2021
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Microsoft Jet Red Database Engine and Access Connectivity Engine can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft Office Trust Center can be exploited remotely to spoof user interface.
  4. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  5. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  6. An information disclosure vulnerability in Visual Basic for Applications can be exploited remotely to obtain sensitive information.
  7. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely to gain privileges.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2021-42293
    warning
  • CVE-2021-43875
    high
  • CVE-2021-43255
    warning
  • CVE-2021-42320
    warning
  • CVE-2021-42294
    high
  • CVE-2021-42309
    high
  • CVE-2021-42295
    warning
  • CVE-2021-43242
    warning
  • CVE-2021-43256
    high
  • CVE-2021-43876
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.