CVE-2017-11882

KEV
Published: Nov 15, 2017 Last Modified: Ott 22, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,8
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 9,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka 'Microsoft Office Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2017-11884.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9438
Percentile
1,0th
Updated

EPSS Score Trend (Last 91 Days)

119

Improper Restriction of Operations within the Bounds of a Memory Buffer

Stable
Common Consequences
Security Scopes Affected:
Integrity Confidentiality Availability
Potential Impacts:
Execute Unauthorized Code Or Commands Modify Memory Read Memory Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory)
Applicable Platforms
Languages: Assembly, C, C++, Memory-Unsafe
View CWE Details
Exploit

Microsoft Office - OLE Remote Code Execution

Microsoft Office - OLE Remote Code Execution

View Exploit Code →
Application

Office by Microsoft

cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Office by Microsoft

cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Office by Microsoft

cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Office by Microsoft

cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017…
http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-wi…
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html
https://github.com/0x09AL/CVE-2017-11882-metasploit
https://github.com/embedi/CVE-2017-11882
https://github.com/rxwx/CVE-2017-11882
https://github.com/unamer/CVE-2017-11882
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-118…
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017…
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-clo…
https://www.exploit-db.com/exploits/43163/
https://www.kb.cert.org/vuls/id/421280
http://www.securityfocus.com/bid/101757
http://www.securitytracker.com/id/1039783
http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-wi…
https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html
https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html
https://github.com/0x09AL/CVE-2017-11882-metasploit
https://github.com/embedi/CVE-2017-11882
https://github.com/rxwx/CVE-2017-11882
https://github.com/unamer/CVE-2017-11882
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-118…
https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017…
https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-clo…
https://www.exploit-db.com/exploits/43163/
https://www.kb.cert.org/vuls/id/421280
http://www.securityfocus.com/bid/101757
http://www.securitytracker.com/id/1039783