Lucene search

K
kasperskyKaspersky LabKLA11010
HistoryMay 09, 2017 - 12:00 a.m.

KLA11010 Remote code execution and elevation of privilege vulnerabilities in Microsoft Office

2017-05-0900:00:00
Kaspersky Lab
threats.kaspersky.com
117

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.955 High

EPSS

Percentile

99.4%

Detect date:

05/09/2017

Severity:

Critical

Description:

Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code and gain privileges.

Affected products:

Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2
Microsoft Office 2013 Service Pack 1
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2016
Microsoft Office 2016 for Mac
Microsoft Office Enterprise Server 2016
Microsoft Word 2007 Service Pack 3
Microsoft Word 2010 Service Pack 2
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2013 Service Pack 1
Microsoft PowerPoint for Mac 2011
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Office Word Viewer
Skype for Business 2016

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2017-0261
CVE-2017-0262
CVE-2017-0265
CVE-2017-0264
CVE-2017-0281
CVE-2017-0254
CVE-2017-0255
CVE-2017-0281
CVE-2017-0265
CVE-2017-0264
CVE-2017-0262
CVE-2017-0261
CVE-2017-0255
CVE-2017-0254

Impacts:

ACE

Related products:

Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats

CVE-IDS:

CVE-2017-02819.3Critical
CVE-2017-02659.3Critical
CVE-2017-02649.3Critical
CVE-2017-02629.3Critical
CVE-2017-02619.3Critical
CVE-2017-02553.5Warning
CVE-2017-02549.3Critical

Microsoft official advisories:

KB list:

3191841
3191835
3191904
3191888
3191909
3191880
3191836
3191843
3178729
3191865
3162040
3191839
3118310
3172458
3114375
3191895
2596904
3191899
3191885
3191863
3191881
3191890
3191913
3191858
3191914
3191915
3212221

Exploitation:

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.955 High

EPSS

Percentile

99.4%