CVE-2017-11882

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
References
Link Resource
http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 Exploit Third Party Advisory
http://www.securityfocus.com/bid/101757 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039783 Third Party Advisory VDB Entry
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html Exploit Third Party Advisory
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html Exploit Patch Third Party Advisory
https://github.com/0x09AL/CVE-2017-11882-metasploit Exploit Third Party Advisory
https://github.com/embedi/CVE-2017-11882 Exploit Third Party Advisory
https://github.com/rxwx/CVE-2017-11882 Exploit Third Party Advisory
https://github.com/unamer/CVE-2017-11882 Exploit Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882 Patch Vendor Advisory
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ Exploit Third Party Advisory
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ Exploit Mitigation Third Party Advisory
https://www.exploit-db.com/exploits/43163/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/421280 Third Party Advisory US Government Resource
http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 Exploit Third Party Advisory
http://www.securityfocus.com/bid/101757 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039783 Third Party Advisory VDB Entry
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html Exploit Third Party Advisory
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html Exploit Patch Third Party Advisory
https://github.com/0x09AL/CVE-2017-11882-metasploit Exploit Third Party Advisory
https://github.com/embedi/CVE-2017-11882 Exploit Third Party Advisory
https://github.com/rxwx/CVE-2017-11882 Exploit Third Party Advisory
https://github.com/unamer/CVE-2017-11882 Exploit Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882 Patch Vendor Advisory
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ Exploit Third Party Advisory
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ Exploit Mitigation Third Party Advisory
https://www.exploit-db.com/exploits/43163/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/421280 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*

History

21 Nov 2024, 03:08

Type Values Removed Values Added
References () http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 - Exploit, Third Party Advisory () http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/101757 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101757 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039783 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039783 - Third Party Advisory, VDB Entry
References () https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html - Exploit, Third Party Advisory () https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html - Exploit, Third Party Advisory
References () https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html - Exploit, Patch, Third Party Advisory () https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html - Exploit, Patch, Third Party Advisory
References () https://github.com/0x09AL/CVE-2017-11882-metasploit - Exploit, Third Party Advisory () https://github.com/0x09AL/CVE-2017-11882-metasploit - Exploit, Third Party Advisory
References () https://github.com/embedi/CVE-2017-11882 - Exploit, Third Party Advisory () https://github.com/embedi/CVE-2017-11882 - Exploit, Third Party Advisory
References () https://github.com/rxwx/CVE-2017-11882 - Exploit, Third Party Advisory () https://github.com/rxwx/CVE-2017-11882 - Exploit, Third Party Advisory
References () https://github.com/unamer/CVE-2017-11882 - Exploit, Third Party Advisory () https://github.com/unamer/CVE-2017-11882 - Exploit, Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882 - Patch, Vendor Advisory
References () https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ - Exploit, Third Party Advisory () https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ - Exploit, Third Party Advisory
References () https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ - Exploit, Mitigation, Third Party Advisory () https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ - Exploit, Mitigation, Third Party Advisory
References () https://www.exploit-db.com/exploits/43163/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/43163/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.kb.cert.org/vuls/id/421280 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/421280 - Third Party Advisory, US Government Resource

Information

Published : 2017-11-15 03:29

Updated : 2024-11-21 03:08


NVD link : CVE-2017-11882

Mitre link : CVE-2017-11882

CVE.ORG link : CVE-2017-11882


JSON object : View

Products Affected

microsoft

  • office
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer