7.8 CVE-2017-11882

Exploit Buffer Overflow Patch Used by Malware Used by Ransomware CISA Kev Catalog Used by Malware
  

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1 und Microsoft Office 2016 ermöglichen es einem Angreifer, beliebigen Code im Kontext des aktuellen Benutzers auszuführen, indem er Objekte im Speicher nicht ordnungsgemäß behandelt, auch bekannt als "Microsoft Office Memory Corruption Vulnerability". Diese CVE-ID ist eindeutig von CVE-2017-11884.
https://nvd.nist.gov/vuln/detail/CVE-2017-11882

Kategorien

CWE-119 : Unzulässige Einschränkung von Operationen innerhalb der Grenzen eines Speicherpuffers

Referenzen

BID

101757
Third Party Advisory VDB Entry

CERT-VN

VU#421280
Third Party Advisory US Government Resource

CONFIRM Patch

EXPLOIT-DB Exploit

43163
Exploit Third Party Advisory VDB Entry

MISC Patch Exploit

http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882
Exploit Third Party Advisory
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html
Exploit Third Party Advisory
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html
Exploit Patch Third Party Advisory
https://github.com/0x09AL/CVE-2017-11882-metasploit
Exploit Third Party Advisory
https://github.com/embedi/CVE-2017-11882
Exploit Third Party Advisory
https://github.com/rxwx/CVE-2017-11882
Exploit Third Party Advisory
https://github.com/unamer/CVE-2017-11882
Exploit Third Party Advisory
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/
Exploit Third Party Advisory
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/
Exploit Mitigation Third Party Advisory

PHK Exploit

SECTRACK

1039783
Third Party Advisory VDB Entry


 

CPE

cpe start ende
Configuration 1
cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*


REMEDIERUNG


Microsoft

Produkt Artikel Download
Microsoft Office 2007 Service Pack 3 4011604 Security Update
Microsoft Office 2010 Service Pack 2 (32-bit editions) 4011618 Security Update
Microsoft Office 2010 Service Pack 2 (64-bit editions) 4011618 Security Update
Microsoft Office 2013 Service Pack 1 (32-bit editions) 3162047 Security Update
Microsoft Office 2013 Service Pack 1 (64-bit editions) 3162047 Security Update
Microsoft Office 2016 (32-bit edition) 4011262 Security Update
Microsoft Office 2016 (64-bit edition) 4011262 Security Update

Patch

Url
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html


EXPLOITS


Exploit-db.com

id beschreibung datum
43163 Microsoft Office - OLE Entfernte Code-Ausführung 2017-11-20 00:00:00

Andere (github, ...)

Url
43163
http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html
https://github.com/0x09AL/CVE-2017-11882-metasploit
https://github.com/embedi/CVE-2017-11882
https://github.com/rxwx/CVE-2017-11882
https://github.com/unamer/CVE-2017-11882
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/
https://github.com/Ridter/CVE-2017-11882
https://github.com/BlackMathIT/2017-11882_Generator
https://github.com/Grey-Li/CVE-2017-11882
https://github.com/Shadowshusky/CVE-2017-11882-
https://github.com/Ridter/RTF_11882_0802
https://github.com/likescam/CVE-2017-11882
https://github.com/likescam/CVE-2018-0802_CVE-2017-11882
https://github.com/lisinan988/CVE-2017-11882-exp
https://github.com/tzwlhack/CVE-2017-11882
https://github.com/rip1s/CVE-2017-11882


CAPEC


Common Attack Pattern Enumerations and Classifications

id beschreibung schweregrad
10 Buffer Overflow via Environment Variables
Hoch
100 Überlaufpuffer
Sehr hoch
123 Buffer Manipulation
Sehr hoch
14 Client-seitige Injektion-induzierter Pufferüberlauf
Hoch
24 Filter Failure through Buffer Overflow
Hoch
42 MIME Conversion
Hoch
44 Überlauf Binäre Ressourcendatei
Sehr hoch
45 Buffer Overflow via Symbolic Links
Hoch
46 Overflow Variables and Tags
Hoch
47 Buffer Overflow via Parameter Expansion
Hoch
8 Buffer Overflow in an API Call
Hoch
9 Buffer Overflow in Local Command-Line Utilities
Hoch


MITRE