Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2017-0199: Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows

Back to Search

Microsoft CVE-2017-0199: Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
04/11/2017
Created
07/25/2018
Added
04/11/2017
Modified
08/23/2019

Description

A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of this vulnerability requires that a user open or preview a specially crafted file with an affected version of Microsoft Office or WordPad. In an email attack scenario, an attacker could exploit the vulnerability by sending a specially crafted file to the user and then convincing the user to open the file. The update addresses the vulnerability by correcting the way that Microsoft Office and WordPad parses specially crafted files, and by enabling API functionality in Windows that Microsoft Office and WordPad will leverage to resolve the identified issue.

Solution(s)

  • msft-kb3141529-f5b3f5e2-09ff-44e0-8799-d50a4c7da981
  • msft-kb3141538-2eda1995-af50-4493-81b3-6027b20986ad
  • msft-kb3141538-6be5e673-e3f6-4c8e-8834-732baf0eb5d3
  • msft-kb3178703-0115cb2b-a3e0-491e-848e-8d1d89984a03
  • msft-kb3178703-83aabf26-64cb-4d2b-8330-859b723a5e17
  • msft-kb3178710-6a1d765c-2972-4a39-b223-c4bba198e659
  • msft-kb3178710-7ff87282-40e2-4090-aa68-2c844f03885e
  • msft-kb4014793-03e738e4-e8cf-44ec-927b-ff7a06d2e62d
  • msft-kb4014793-0aa6ff72-0e80-49a5-8863-c7a06f9ee57f
  • msft-kb4014793-2c4cf89d-a1e3-4e8d-89a6-732be58d1953
  • msft-kb4014793-8d8b4571-dce0-40cb-9848-6a49b806a09b
  • msft-kb4014793-a6fab700-f42d-4b24-b96a-1129996c55d6
  • msft-kb4014793-d71126d3-5f8d-48c8-980d-93733260ff2a
  • msft-kb4015546-592c9a40-6bdc-4122-8496-0b4295cf7a86
  • msft-kb4015546-61107fd4-8fba-4639-9c3a-d70a69936b4e
  • msft-kb4015546-7026cec0-32bf-4488-b45a-838aa929c109
  • msft-kb4015546-c77661d2-7566-4f86-943c-264545419691
  • msft-kb4015546-cc8006a9-8438-45aa-a20d-cceef511098d
  • msft-kb4015546-e2e88e16-fd32-4c2e-8848-69817601c17b
  • msft-kb4015548-31ca69ca-ca73-4405-860b-037051bd1984
  • msft-kb4015548-72db1a7d-338c-4903-9869-9fd8258b643a
  • msft-kb4015548-d1986d38-72dd-4e1a-877e-70a3f77f7802

References

  • msft-kb3141529-f5b3f5e2-09ff-44e0-8799-d50a4c7da981
  • msft-kb3141538-2eda1995-af50-4493-81b3-6027b20986ad
  • msft-kb3141538-6be5e673-e3f6-4c8e-8834-732baf0eb5d3
  • msft-kb3178703-0115cb2b-a3e0-491e-848e-8d1d89984a03
  • msft-kb3178703-83aabf26-64cb-4d2b-8330-859b723a5e17
  • msft-kb3178710-6a1d765c-2972-4a39-b223-c4bba198e659
  • msft-kb3178710-7ff87282-40e2-4090-aa68-2c844f03885e
  • msft-kb4014793-03e738e4-e8cf-44ec-927b-ff7a06d2e62d
  • msft-kb4014793-0aa6ff72-0e80-49a5-8863-c7a06f9ee57f
  • msft-kb4014793-2c4cf89d-a1e3-4e8d-89a6-732be58d1953
  • msft-kb4014793-8d8b4571-dce0-40cb-9848-6a49b806a09b
  • msft-kb4014793-a6fab700-f42d-4b24-b96a-1129996c55d6
  • msft-kb4014793-d71126d3-5f8d-48c8-980d-93733260ff2a
  • msft-kb4015546-592c9a40-6bdc-4122-8496-0b4295cf7a86
  • msft-kb4015546-61107fd4-8fba-4639-9c3a-d70a69936b4e
  • msft-kb4015546-7026cec0-32bf-4488-b45a-838aa929c109
  • msft-kb4015546-c77661d2-7566-4f86-943c-264545419691
  • msft-kb4015546-cc8006a9-8438-45aa-a20d-cceef511098d
  • msft-kb4015546-e2e88e16-fd32-4c2e-8848-69817601c17b
  • msft-kb4015548-31ca69ca-ca73-4405-860b-037051bd1984
  • msft-kb4015548-72db1a7d-338c-4903-9869-9fd8258b643a
  • msft-kb4015548-d1986d38-72dd-4e1a-877e-70a3f77f7802

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;