Microsoft Office 2016 Click-to-Run (C2R) and Microsoft Office 2016 for Mac allow an attacker to use a specially crafted file to perform actions in the security context of the current user, due to how Microsoft Office handles files in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101124 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039539 | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11825 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2017-10-10T00:00:00
Updated: 2017-10-14T09:57:01
Reserved: 2017-07-31T00:00:00
Link: CVE-2017-11825
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-10-13T13:29:02.037
Modified: 2018-03-16T14:03:09.080
Link: CVE-2017-11825
JSON object: View
Redhat Information
No data.
CWE