Vulnerability Name: CVE-2017-11826 (CCN-133138) Assigned: 2017-10-10 Published: 2017-10-10 Updated: 2017-12-12 Summary: Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory. CVSS v3 Severity: 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H )7.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H )7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-119 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2017-11826 Source: BID Type: Third Party Advisory, VDB Entry101219 Source: CCN Type: BID-101219Microsoft Office CVE-2017-11826 Memory Corruption Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1039541 Source: MISC Type: UNKNOWNhttps://0patch.blogspot.com/2017/11/0patching-pretty-nasty-microsoft-word.html Source: XF Type: UNKNOWNms-office-cve201711826-code-exec(133138) Source: CCN Type: Microsoft Security TechCenter - October 2017Microsoft Office Memory Corruption Vulnerability Source: CONFIRM Type: Patch, Vendor Advisoryhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11826 Source: MISC Type: Technical Description, Third Party Advisoryhttps://securingtomorrow.mcafee.com/mcafee-labs/analyzing-microsoft-office-zero-day-exploit-cve-2017-11826-memory-corruption-vulnerability/ Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCYKNOWN EXPLOITED VULNERABILITIES CATALOG Source: MISC Type: UNKNOWNhttps://www.tarlogic.com/en/blog/exploiting-word-cve-2017-11826/ Vulnerable Configuration: Configuration 1 :cpe:/a:microsoft:office:2010:*:*:*:*:*:*:* OR cpe:/a:microsoft:office_online_server:*:*:*:*:*:*:*:* OR cpe:/a:microsoft:office_web_apps:*:*:*:*:*:*:*:* OR cpe:/a:microsoft:office_web_apps:2010:*:*:*:*:*:*:* OR cpe:/a:microsoft:office_web_apps:2013:*:*:*:*:*:*:* OR cpe:/a:microsoft:sharepoint_enterprise_server:2010:*:*:*:*:*:*:* OR cpe:/a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:* OR cpe:/a:microsoft:web_applications:*:*:*:*:*:*:*:* OR cpe:/a:microsoft:word:2007:*:*:*:*:*:*:* OR cpe:/a:microsoft:word:2010:*:*:*:*:*:*:* OR cpe:/a:microsoft:word:2013:*:*:*:*:*:*:* OR cpe:/a:microsoft:word:2016:*:*:*:*:*:*:* OR cpe:/a:microsoft:word_viewer:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:microsoft:word_viewer:-:*:*:*:*:*:*:* OR cpe:/a:microsoft:office_compatibility_pack::sp3:*:*:*:*:*:* OR cpe:/a:microsoft:word:2007:sp3:*:*:*:*:*:* OR cpe:/a:microsoft:word:2010:sp2:*:*:*:*:x32:* OR cpe:/a:microsoft:word:2010:sp2:*:*:*:*:x64:* OR cpe:/a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:* OR cpe:/a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:* OR cpe:/a:microsoft:word:2013:sp1:*:*:*:*:x32:* OR cpe:/a:microsoft:word:2013:sp1:*:*:*:*:x64:* OR cpe:/a:microsoft:word:2013:sp1:~~rt~~~:*:*:*:*:* OR cpe:/a:microsoft:word:2016:*:*:*:*:*:x32:* OR cpe:/a:microsoft:word:2016:*:*:*:*:*:x64:* OR cpe:/a:microsoft:sharepoint_enterprise_server:2016:-:*:*:*:*:*:* OR cpe:/a:microsoft:word_automation_services:-:*:*:*:*:*:*:* OR cpe:/a:microsoft:office_online_server:2016:*:*:*:*:*:*:* AND cpe:/a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:* OR cpe:/a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:* Denotes that component is vulnerable BACK
microsoft office 2010
microsoft office online server *
microsoft office web apps *
microsoft office web apps 2010
microsoft office web apps 2013
microsoft sharepoint enterprise server 2010
microsoft sharepoint server 2010
microsoft web applications *
microsoft word 2007
microsoft word 2010
microsoft word 2013
microsoft word 2016
microsoft word viewer *
microsoft word viewer -
microsoft office compatibility pack sp3
microsoft word 2007 sp3
microsoft word 2010 sp2
microsoft word 2010 sp2
microsoft office web apps 2010 sp2
microsoft office web apps 2013 sp1
microsoft word 2013 sp1
microsoft word 2013 sp1
microsoft word 2013 sp1
microsoft word 2016
microsoft word 2016
microsoft sharepoint enterprise server 2016 -
microsoft word automation services -
microsoft office online server 2016
microsoft sharepoint server 2010 sp1
microsoft sharepoint server 2013 sp1