PT-2017-1874 · Microsoft · Windows +3
Published
2017-04-11
·
Updated
2025-08-30
·
CVE-2017-0199
9.3
High
Base vector | Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Microsoft Office versions 2007 SP3 through 2016
Microsoft Windows versions Vista SP2 through 8.1
Windows Server 2008 SP2
Description:
The issue allows remote attackers to execute arbitrary code via a crafted document. This is related to insufficient access control in Microsoft Office and Windows. An attacker who successfully exploits this could take control of an affected system, install programs, view, change, or delete data, or create new accounts with full user rights. Exploitation requires a user to open or preview a specially crafted file with an affected version of Microsoft Office or WordPad.
Recommendations:
For Microsoft Office 2007 SP3, update to a newer version to mitigate the risk.
For Microsoft Office 2010 SP2, update to a newer version to mitigate the risk.
For Microsoft Office 2013 SP1, update to a newer version to mitigate the risk.
For Microsoft Office 2016, update to a newer version to mitigate the risk.
For Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8.1, update to a newer version to mitigate the risk.
As a temporary workaround, consider avoiding the use of `specially crafted files` in the affected API endpoint until the issue is resolved.
Restrict access to the vulnerable `Microsoft Office` and `WordPad` components to minimize the risk of exploitation.
Exploit
Fix
Improper Access Control
Weakness Enumeration
Related Identifiers
Affected Products
References · 116
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/office_word_hta.rb⭐ 35019 🔗 14201 · Exploit
- 🔥 https://github.com/qazbnm456/awesome-cve-poc/blob/master/CVE-2017-0199.md⭐ 3368 🔗 723 · Exploit
- 🔥 https://github.com/bhdresh/CVE-2017-0199⭐ 725 🔗 261 · Exploit
- 🔥 https://github.com/haibara3839/CVE-2017-0199-master⭐ 16 🔗 10 · Exploit
- 🔥 https://github.com/SyFi/cve-2017-0199⭐ 12 🔗 10 · Exploit
- 🔥 https://github.com/NotAwful/CVE-2017-0199-Fix⭐ 14 🔗 2 · Exploit
- 🔥 https://github.com/Exploit-install/CVE-2017-0199⭐ 7 🔗 9 · Exploit
- 🔥 https://github.com/n1shant-sinha/CVE-2017-0199⭐ 2 🔗 4 · Exploit
- 🔥 https://github.com/kn0wm4d/htattack⭐ 2 🔗 3 · Exploit
- 🔥 https://github.com/nicpenning/RTF-Cleaner⭐ 3 🔗 2 · Exploit
- 🔥 https://github.com/herbiezimmerman/2017-11-17-Maldoc-Using-CVE-2017-0199⭐ 2 🔗 3 · Exploit
- 🔥 https://github.com/Sunqiz/CVE-2017-0199-reprofuction⭐ 2 🔗 3 · Exploit
- 🔥 https://github.com/jacobsoo/RTF-Cleaner⭐ 3 🔗 1 · Exploit
- 🔥 https://exploit-db.com/exploits/41934 · Exploit
- 🔥 https://blog.nviso.be/2017/04/12/analysis-of-a-cve-2017-0199-malicious-rtf-document · Exploit