Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0852

EPSS 30.54% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0852

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 and RT SP1, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Outlook handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0851.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Office 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Outlook等都是美国微软(Microsoft)公司的产品。Microsoft Outlook是一套Office套件中的电子邮件客户端软件。Office Click-to-Run(C2R)是一套办公软件套件产品。 Microsoft Office中存在远程代码执行漏洞,该漏洞源于程序没有正确的处理内存中的对象。远程攻击者可借助特制的文件利用该漏洞在当前用户的上下文中执行任意代码或造成拒绝服务。以下版本受到影响:Microsoft Outlook 2007 SP3,Microsoft
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Microsoft CorporationMicrosoft Office Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 and RT SP1, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run (C2R). -

II. Public POCs for CVE-2018-0852

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0852

登录查看更多情报信息。

Same Patch Batch · Microsoft Corporation · 2018-02-15 · 48 CVEs total

CVE-2018-0846Microsoft Windows Common Log File System驱动程序权限许可和访问控制问题漏洞
CVE-2018-0851Microsoft Office 缓冲区错误漏洞
CVE-2018-0855Microsoft Embedded OpenType字体引擎信息泄露漏洞
CVE-2018-0859Microsoft Edge和ChakraCore 缓冲区错误漏洞
CVE-2018-0860Microsoft Edge和ChakraCore 缓冲区错误漏洞
CVE-2018-0861Microsoft Edge scripting引擎缓冲区错误漏洞
CVE-2018-0866Microsoft Internet Explorer scripting引擎缓冲区错误漏洞
CVE-2018-0869Microsoft SharePoint Server 权限许可和访问控制漏洞
CVE-2018-0858Microsoft ChakraCore 缓冲区错误漏洞
CVE-2018-0847Microsoft Windows scripting引擎信息泄露漏洞
CVE-2018-0850Microsoft Outlook 权限许可和访问控制问题漏洞
CVE-2018-0844Microsoft Windows Common Log File System驱动程序权限许可和访问控制问题漏洞
CVE-2018-0843Microsoft Windows kernel 信息泄露漏洞
CVE-2018-0841Microsoft Office 2016 Click-to-Run 安全漏洞
CVE-2018-0840Microsoft Edge、IE和ChakraCore 缓冲区错误漏洞
CVE-2018-0839Microsoft Edge 信息泄露漏洞
CVE-2018-0838Microsoft Edge和ChakraCore 缓冲区错误漏洞
CVE-2018-0837Microsoft Edge和ChakraCore 缓冲区错误漏洞
CVE-2018-0836Microsoft Edge和ChakraCore 缓冲区错误漏洞
CVE-2018-0835Microsoft Edge和ChakraCore 缓冲区错误漏洞

Showing top 20 of 48 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-0852

No comments yet


Leave a comment