Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774 | patch vendor advisory |
http://www.securityfocus.com/bid/101098 | vdb entry third party advisory broken link |
http://www.securitytracker.com/id/1039542 | vdb entry third party advisory broken link |
https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/ | exploit |