CVE-2017-11774
KEV
🔴 Łataj teraz
Błąd w Microsoft Outlook umożliwia atakującemu wykonanie dowolnych poleceń.
CVSS
7.8
EPSS
84.6%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 84.6% |
| Opublikowano (NVD) | 2017-10-13 13:29:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 13:48:34 UTC |
Referencje
- http://www.securityfocus.com/bid/101098 (secure@microsoft.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1039542 (secure@microsoft.com) [Broken Link, Third Party Advisory, VDB Entry]
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774 (secure@microsoft.com) [Patch, Vendor Advisory]
- https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/ (secure@microsoft.com) [Exploit]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-11774 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]