// For flags

CVE-2017-11882

Microsoft Office Memory Corruption Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

29
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1 y Microsoft Office 2016 permiten que un atacante ejecute código arbitrario en el contexto del usuario actual al no gestionar correctamente los objetos en la memoria. Esto también se conoce como "Microsoft Office Memory Corruption Vulnerability". El ID de este CVE es diferente de CVE-2017-11884.

Microsoft Office contains a memory corruption vulnerability that allows remote code execution in the context of the current user.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-07-31 CVE Reserved
  • 2017-11-15 CVE Published
  • 2017-11-15 First Exploit
  • 2021-11-03 Exploited in Wild
  • 2022-05-03 KEV Due Date
  • 2024-02-18 EPSS Updated
  • 2024-09-16 CVE Updated
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (34)
URL Date SRC
https://www.exploit-db.com/exploits/43163 2024-09-16
https://github.com/Ridter/CVE-2017-11882 2017-11-29
https://github.com/embedi/CVE-2017-11882 2024-09-16
https://github.com/rip1s/CVE-2017-11882 2017-12-06
https://github.com/starnightcyber/CVE-2017-11882 2017-11-28
https://github.com/0x09AL/CVE-2017-11882-metasploit 2024-09-16
https://github.com/littlebin404/CVE-2017-11882 2020-12-22
https://github.com/ChaitanyaHaritash/CVE-2017-11882 2018-05-04
https://github.com/Shadowshusky/CVE-2017-11882- 2017-11-24
https://github.com/ekgg/Overflow-Demo-CVE-2017-11882 2020-01-09
https://github.com/tzwlhack/CVE-2017-11882 2017-11-29
https://github.com/j0lama/CVE-2017-11882 2018-10-23
https://github.com/chanbin/CVE-2017-11882 2018-12-10
https://github.com/likescam/CVE-2017-11882 2017-11-29
https://github.com/HaoJame/CVE-2017-11882 2020-11-10
https://github.com/ActorExpose/CVE-2017-11882 2020-12-03
https://github.com/Grey-Li/CVE-2017-11882 2017-11-21
https://github.com/Sunqiz/CVE-2017-11882-reproduction 2022-09-20
https://github.com/lisinan988/CVE-2017-11882-exp 2017-11-29
https://github.com/n18dcat053-luuvannga/DetectPacket-CVE-2017-11882 2023-05-15
https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam 2018-04-23
http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 2024-09-16
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html 2024-09-16
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html 2024-09-16
https://github.com/rxwx/CVE-2017-11882 2024-09-16
https://github.com/unamer/CVE-2017-11882 2024-09-16
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild 2024-09-16
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about 2024-09-16
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/office_ms17_11882.rb 2017-11-15
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Office
Search vendor "Microsoft" for product "Office"
2007
Search vendor "Microsoft" for product "Office" and version "2007"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Office
Search vendor "Microsoft" for product "Office"
2010
Search vendor "Microsoft" for product "Office" and version "2010"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Office
Search vendor "Microsoft" for product "Office"
2013
Search vendor "Microsoft" for product "Office" and version "2013"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Office
Search vendor "Microsoft" for product "Office"
2016
Search vendor "Microsoft" for product "Office" and version "2016"
-
Affected