Описание
Microsoft Outlook Security Feature Bypass Vulnerability
A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of file formats. The security feature bypass by itself does not allow arbitrary code execution. However, to successfully exploit the vulnerability, an attacker would have to use it in conjunction with another vulnerability, such as a remote code execution vulnerability, to take advantage of the security feature bypass vulnerability and run arbitrary code.
To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Microsoft Outlook software.
The security update addresses the vulnerability by correcting how Microsoft Outlook handles the parsing of file formats.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Microsoft Outlook 2007 Service Pack 3 | ||
Microsoft Outlook 2013 RT Service Pack 1 | - | |
Microsoft Outlook 2010 Service Pack 2 (32-bit editions) | ||
Microsoft Outlook 2010 Service Pack 2 (64-bit editions) | ||
Microsoft Outlook 2016 (32-bit edition) | ||
Microsoft Outlook 2016 (64-bit edition) | ||
Microsoft Outlook 2013 Service Pack 1 (32-bit editions) | ||
Microsoft Outlook 2013 Service Pack 1 (64-bit editions) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
Связанные уязвимости
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats, aka "Microsoft Office Security Feature Bypass Vulnerability".
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats, aka "Microsoft Office Security Feature Bypass Vulnerability".
EPSS