CVE-2018-8310
CVSSN/A
发布时间 :2018-07-10 20:29:02
修订时间 :2018-07-11 21:29:06
NMS    

[原文]A tampering vulnerability exists when Microsoft Outlook does not properly handle specific attachment types when rendering HTML emails, aka "Microsoft Office Tampering Vulnerability." This affects Microsoft Word, Microsoft Office.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8310
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8310
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/104615
(UNKNOWN)  BID  104615
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8310
(UNKNOWN)  CONFIRM  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8310

- 漏洞信息

Microsoft Office CVE-2018-8310 Security Bypass Vulnerability
Unknown 104615
Yes No
2018-07-10 12:00:00 2018-07-10 12:00:00
Jonathan Birch of Microsoft Corporation

- 受影响的程序版本

Microsoft Word 2016 (64-bit edition) 0
Microsoft Word 2016 (32-bit edition) 0
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 RT Service Pack 1 0
Microsoft Word 2010 Service Pack 2 (64-bit editions) 0
Microsoft Word 2010 Service Pack 2 (32-bit editions) 0
Microsoft Office 2016 Click-to-Run (C2R) for 64-bit edition 0
- Microsoft Windows NT 4.0
Microsoft Office 2016 Click-to-Run (C2R) for 32-bit edition 0
- Microsoft Windows NT 4.0
Microsoft Office 2010 (64-bit edition) SP2
Microsoft Office 2010 (32-bit edition) SP2

- 漏洞讨论

Microsoft Office is prone to a security bypass vulnerability.

An attacker can leverage this issue to bypass certain security restrictions; this may aid in launching further attacks.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站