Lucene search

K
cve[email protected]CVE-2018-8587
HistoryDec 12, 2018 - 12:29 a.m.

CVE-2018-8587

2018-12-1200:29:00
NVD-CWE-noinfo
web.nvd.nist.gov
57
microsoft outlook
remote code execution
vulnerability
memory handling
office 365 proplus
microsoft office

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.028 Low

EPSS

Percentile

90.6%

A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka “Microsoft Outlook Remote Code Execution Vulnerability.” This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook.

VendorProductVersionCPE
microsoftoffice*cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
microsoftoffice*cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
microsoftoffice*cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
microsoftoffice*cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
microsoftoutlook*cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*
microsoftoutlook*cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*
microsoftoutlook*cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*
microsoftoutlook*cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*
microsoftoutlook*cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*
microsoftoutlook*cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 111

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.028 Low

EPSS

Percentile

90.6%