Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hgr7-mfwx-6c5g

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A security feature bypass vulnerability exists in the way that Office Click-to-Run (C2R) components handle a specially crafted file, which could lead to a standard user, any AppContainer sandbox, and Office LPAC Protected View to escalate privileges to SYSTEM.To exploit this bug, an attacker would have to run a specially crafted file, aka 'Microsoft Office ClickToRun Security Feature Bypass Vulnerability'.

A security feature bypass vulnerability exists in the way that Office Click-to-Run (C2R) components handle a specially crafted file, which could lead to a standard user, any AppContainer sandbox, and Office LPAC Protected View to escalate privileges to SYSTEM.To exploit this bug, an attacker would have to run a specially crafted file, aka 'Microsoft Office ClickToRun Security Feature Bypass Vulnerability'.

EPSS

Процентиль: 91%
0.0625
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
почти 6 лет назад

A security feature bypass vulnerability exists in the way that Office Click-to-Run (C2R) components handle a specially crafted file, which could lead to a standard user, any AppContainer sandbox, and Office LPAC Protected View to escalate privileges to SYSTEM.To exploit this bug, an attacker would have to run a specially crafted file, aka 'Microsoft Office ClickToRun Security Feature Bypass Vulnerability'.

msrc
почти 6 лет назад

Microsoft Office ClickToRun Security Feature Bypass Vulnerability

CVSS3: 9.8
fstec
почти 6 лет назад

Уязвимость компонента Click-to-Run (C2R) офисных программ Microsoft Office и Office 365,позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 91%
0.0625
Низкий