Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2019-1446: Microsoft Excel Information Disclosure Vulnerability

Back to Search

Microsoft CVE-2019-1446: Microsoft Excel Information Disclosure Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
11/12/2019
Created
11/13/2019
Added
11/12/2019
Modified
11/15/2019

Description

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Excel functions handle objects in memory.

Solution(s)

  • msft-kb4484141-321c5179-a19a-4255-9cf0-5e978c24e629
  • msft-kb4484144-a6292a87-6f57-4936-9761-fda328f09017
  • msft-kb4484144-c66adb99-5703-474e-88c5-fd76332959c9
  • msft-kb4484148-7be3801a-f991-4873-bb0c-165ff8796675
  • msft-kb4484148-f48ff769-7ef3-454e-88e5-ff328a3ebd10
  • msft-kb4484151-d81616ce-11eb-4e98-af1f-aea6b8eee196
  • msft-kb4484152-4941fc17-8db4-4c82-a263-f991fedd105c
  • msft-kb4484152-b375ff4f-fa67-4366-9b98-843b4d925ae7
  • msft-kb4484158-a690c27f-0ce8-4d7a-ac43-f342c856ad1f
  • msft-kb4484158-a76f01ab-cb25-4c23-9468-8164bc6fef65
  • msft-kb4484159-19b85cba-6a39-4ec6-ad09-13b7c5a40782
  • msft-kb4484160-838d7738-3dd8-49c0-8366-43373bc58969
  • msft-kb4484160-a3cca6c9-4815-4af8-948a-4408804d4965
  • msft-kb4484164-13bfd62d-32b7-4a06-998a-e156f1d96587
  • msft-kb4484164-ae20c3ca-65b8-42b5-9c80-aea351703ae7

References

  • msft-kb4484141-321c5179-a19a-4255-9cf0-5e978c24e629
  • msft-kb4484144-a6292a87-6f57-4936-9761-fda328f09017
  • msft-kb4484144-c66adb99-5703-474e-88c5-fd76332959c9
  • msft-kb4484148-7be3801a-f991-4873-bb0c-165ff8796675
  • msft-kb4484148-f48ff769-7ef3-454e-88e5-ff328a3ebd10
  • msft-kb4484151-d81616ce-11eb-4e98-af1f-aea6b8eee196
  • msft-kb4484152-4941fc17-8db4-4c82-a263-f991fedd105c
  • msft-kb4484152-b375ff4f-fa67-4366-9b98-843b4d925ae7
  • msft-kb4484158-a690c27f-0ce8-4d7a-ac43-f342c856ad1f
  • msft-kb4484158-a76f01ab-cb25-4c23-9468-8164bc6fef65
  • msft-kb4484159-19b85cba-6a39-4ec6-ad09-13b7c5a40782
  • msft-kb4484160-838d7738-3dd8-49c0-8366-43373bc58969
  • msft-kb4484160-a3cca6c9-4815-4af8-948a-4408804d4965
  • msft-kb4484164-13bfd62d-32b7-4a06-998a-e156f1d96587
  • msft-kb4484164-ae20c3ca-65b8-42b5-9c80-aea351703ae7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;