PT-2017-1874 · Microsoft · Windows Server +3
Published
2017-04-11
·
Updated
2025-10-12
·
CVE-2017-0199
CVSS v2.0
9.3
9.3
High
Base vector | Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Office versions 2007 SP3 through 2016
Microsoft Windows versions Vista SP2 through 8.1
Windows Server 2008 SP2
Description
The issue allows remote attackers to execute arbitrary code via a crafted document. This is related to insufficient access control in Microsoft Office and Windows. An attacker who successfully exploits this could take control of an affected system, install programs, view, change, or delete data, or create new accounts with full user rights. Exploitation requires a user to open or preview a specially crafted file with an affected version of Microsoft Office or WordPad.
Recommendations
For Microsoft Office 2007 SP3, update to a newer version to mitigate the risk.
For Microsoft Office 2010 SP2, update to a newer version to mitigate the risk.
For Microsoft Office 2013 SP1, update to a newer version to mitigate the risk.
For Microsoft Office 2016, update to a newer version to mitigate the risk.
For Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8.1, update to a newer version to mitigate the risk.
As a temporary workaround, consider avoiding the use of
specially crafted files
in the affected API endpoint until the issue is resolved.
Restrict access to the vulnerable Microsoft Office
and WordPad
components to minimize the risk of exploitation.Exploit
Fix
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2017-01034
CVE-2017-0199
Affected Products
Office
Windows
Windows Server
Wordpad
References · 121
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/office_word_hta.rb⭐ 35019 🔗 14201 · Exploit
- 🔥 https://github.com/qazbnm456/awesome-cve-poc/blob/master/CVE-2017-0199.md⭐ 3368 🔗 723 · Exploit
- 🔥 https://github.com/bhdresh/CVE-2017-0199⭐ 725 🔗 261 · Exploit
- 🔥 https://github.com/haibara3839/CVE-2017-0199-master⭐ 16 🔗 10 · Exploit
- 🔥 https://github.com/SyFi/cve-2017-0199⭐ 12 🔗 10 · Exploit
- 🔥 https://github.com/Exploit-install/CVE-2017-0199⭐ 7 🔗 9 · Exploit
- 🔥 https://github.com/NotAwful/CVE-2017-0199-Fix⭐ 14 🔗 2 · Exploit
- 🔥 https://github.com/n1shant-sinha/CVE-2017-0199⭐ 2 🔗 4 · Exploit
- 🔥 https://github.com/Sunqiz/CVE-2017-0199-reprofuction⭐ 2 🔗 3 · Exploit
- 🔥 https://github.com/herbiezimmerman/2017-11-17-Maldoc-Using-CVE-2017-0199⭐ 2 🔗 3 · Exploit
- 🔥 https://github.com/nicpenning/RTF-Cleaner⭐ 3 🔗 2 · Exploit
- 🔥 https://github.com/kn0wm4d/htattack⭐ 2 🔗 3 · Exploit
- 🔥 https://github.com/jacobsoo/RTF-Cleaner⭐ 3 🔗 1 · Exploit
- 🔥 https://exploit-db.com/exploits/41934 · Exploit
- 🔥 https://mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler-vulnerability · Exploit