SB2018010914 - Multiple vulnerabilities in Microsoft Word
Published: January 9, 2018
Security Bulletin ID
SB2018010914
Severity
High
Patch available
YES
Number of vulnerabilities
10
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2018-0812)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
2) Memory corruption (CVE-ID: CVE-2018-0807)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
3) Memory corruption (CVE-ID: CVE-2018-0806)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
4) Memory corruption (CVE-ID: CVE-2018-0805)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
5) Memory corruption (CVE-ID: CVE-2018-0801)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
6) Memory corruption (CVE-ID: CVE-2018-0798)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
7) Use-after-free (CVE-ID: CVE-2018-0797)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a use-after-free error when processing RTF files in Microsoft Word. A remote attacker can create a specially crafted RTF document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
8) Memory corruption (CVE-ID: CVE-2018-0794)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
9) Memory corruption (CVE-ID: CVE-2018-0793)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists in Microsoft Office software due to improper handling of objects in memory. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
10) Memory corruption (CVE-ID: CVE-2018-0804)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to a boundary error when processing Microsoft Word documents. A remote attacker can create a specially crafted Word document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office or Microsoft WordPad software.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0812
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0807
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0806
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0805
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0801
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0798
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0797
- https://fortiguard.com/zeroday/2092
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0794
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0793
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804