Vulnerability Name: | CVE-2017-11774 (CCN-132568) | ||||||||||||
Assigned: | 2017-10-10 | ||||||||||||
Published: | 2017-10-10 | ||||||||||||
Updated: | 2021-08-30 | ||||||||||||
Summary: | Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability." | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-11774 Source: BID Type: Third Party Advisory, VDB Entry 101098 Source: CCN Type: BID-101098 Microsoft Office Outlook CVE-2017-11774 Security Bypass Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039542 Source: XF Type: UNKNOWN ms-outlook-cve201711774-sec-bypass(132568) Source: CCN Type: Microsoft Security TechCenter - October 2017 Microsoft Outlook Security Feature Bypass Vulnerability Source: CONFIRM Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774 Source: MISC Type: UNKNOWN https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/ Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |