Описание
Microsoft OneNote Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Microsoft OneNote improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
To exploit the vulnerability, an attacker must first convince a user to open a specially crafted OneNote document.
The updates address the vulnerability by correcting how OneNote validates input before loading DLL files.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft OneNote 2007 Service Pack 3 | ||
| Microsoft OneNote 2010 Service Pack 2 (32-bit editions) | ||
| Microsoft OneNote 2010 Service Pack 2 (64-bit editions) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
Связанные уязвимости
Microsoft OneNote 2007 SP3 and Microsoft OneNote 2010 SP2 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office DLL Loading Vulnerability."
Microsoft OneNote 2007 SP3 and Microsoft OneNote 2010 SP2 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office DLL Loading Vulnerability."
Уязвимость программного средства для создания заметок Microsoft OneNote, позволяющая нарушителю выполнить произвольный код
EPSS