| Summary | A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or other message, and then convince the user to open the specially crafted file. HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Options Outlook 2013: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Options Outlook 2016, Outlook 2019, and Office 365 ProPlus: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Options |
|---|---|
| Publication Date | Aug. 15, 2019, 6:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:38 a.m. |
| Last Update | Nov. 21, 2024, 1:36 p.m. |
| CVSS3.0 : HIGH | |
| スコア | 7.8 |
|---|---|
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ローカル |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | はい |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:* | |||||
| cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:* | |||||
| Title | 複数の Microsoft 製品におけるリモートでコードを実行される脆弱性 |
|---|---|
| Summary | 複数の Microsoft 製品には、Microsoft Word ソフトウェアがメモリ内のオブジェクトの適切な処理に失敗した場合、リモートでコードを実行される脆弱性が存在します。 ベンダは、本脆弱性を「Microsoft Word のリモートでコードが実行される脆弱性」として公開しています。 本脆弱性は、CVE-2019-1201 とは異なる脆弱性です。 |
| Possible impacts | リモートでコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 13, 2019, midnight |
| Registration Date | Aug. 21, 2019, 3:38 p.m. |
| Last Update | July 8, 2024, 3:09 p.m. |
| マイクロソフト |
| Microsoft Office 2016 for Mac |
| Microsoft Office 2019 for 32-bit editions |
| Microsoft Office 2019 for 64-bit editions |
| Microsoft Office 2019 for Mac |
| Microsoft Office Online Server |
| Microsoft SharePoint Server 2019 |
| Office 365 ProPlus for 32-bit Systems |
| Office 365 ProPlus for 64-bit Systems |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2019年08月21日] 掲載 |
Aug. 21, 2019, 3:38 p.m. |
| 2 | [2024年07月08日] CVSS による深刻度:内容を更新 CWE による脆弱性タイプ一覧:内容を更新 |
July 8, 2024, 3:08 p.m. |