目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2020-1494— Microsoft Excel 缓冲区错误漏洞

EPSS 15.38% · P95
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2020-1494の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Microsoft Excel Remote Code Execution Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft Excel 缓冲区错误漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft Excel是美国微软(Microsoft)公司的一款Office套件中的电子表格处理软件。 Microsoft Excel中存在远程代码执行漏洞,该漏洞源于程序没有正确处理内存中的对象。攻击者可借助特制文件利用该漏洞在当前用户上下文中运行任意代码。以下产品及版本受到影响:Microsoft Excel 2010 SP2,Excel 2013 RT SP1,Excel 2013 SP1,Excel 2016;Office 2010 SP2,Office 2013 RT SP1,Offic
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*
MicrosoftMicrosoft Excel 2016 16.0.0.0 ~ publication cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*
MicrosoftMicrosoft Office 2016 16.0.0 ~ publication cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*
MicrosoftMicrosoft Excel 2010 Service Pack 2 13.0.0.0 ~ publication cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*
MicrosoftMicrosoft Excel 2013 Service Pack 1 15.0.0.0 ~ publication cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*
MicrosoftMicrosoft Office 2010 Service Pack 2 13.0.0.0 ~ publication cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*
MicrosoftMicrosoft Office 2013 Service Pack 1 15.0.0 ~ publication cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*

II. CVE-2020-1494の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2020-1494のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-08-17 · 121 CVEs total

CVE-2020-146710.0 CRITICALWindows Hard Link Elevation of Privilege Vulnerability
CVE-2020-15838.8 HIGHMicrosoft Word Information Disclosure Vulnerability
CVE-2020-15048.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-15528.0 HIGHWindows Work Folder Service Elevation of Privilege Vulnerability
CVE-2020-15217.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2020-15347.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-15337.8 HIGHWindows WalletService Elevation of Privilege Vulnerability
CVE-2020-15317.8 HIGHWindows Accounts Control Elevation of Privilege Vulnerability
CVE-2020-15307.8 HIGHWindows Remote Access Elevation of Privilege Vulnerability
CVE-2020-15297.8 HIGHWindows GDI Elevation of Privilege Vulnerability
CVE-2020-15287.8 HIGHWindows Radio Manager API Elevation of Privilege Vulnerability
CVE-2020-15277.8 HIGHWindows Custom Protocol Engine Elevation of Privilege Vulnerability
CVE-2020-15267.8 HIGHWindows Network Connection Broker Elevation of Privilege Vulnerability
CVE-2020-15257.8 HIGHMedia Foundation Memory Corruption Vulnerability
CVE-2020-15247.8 HIGHWindows Speech Shell Components Elevation of Privilege Vulnerability
CVE-2020-15137.8 HIGHWindows CSC Service Elevation of Privilege Vulnerability
CVE-2020-15167.8 HIGHWindows Work Folders Service Elevation of Privilege Vulnerability
CVE-2020-15157.8 HIGHWindows Telephony Server Elevation of Privilege Vulnerability
CVE-2020-15177.8 HIGHWindows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2020-15127.8 HIGHWindows State Repository Service Information Disclosure Vulnerability

Showing 20 of 121 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2020-1494へのコメント

まだコメントはありません


コメントを残す