Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-21716

Опубликовано: 17 фев. 2023
Источник: msrc
CVSS3: 9.8
EPSS Критический

Описание

Microsoft Word Remote Code Execution Vulnerability

Обходное решение

Use Microsoft Office File Block policy to prevent Office from opening RTF documents from unknown or untrusted sources.

Warning: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

Impact of Workaround. Users who have configured the File Block policy and have not configured a special “exempt directory” as discussed in Microsoft Knowledge Base Article 922849 will be unable to open documents saved in the RTF format.

For Office 2013

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 2.

  3. Set the OpenInProtectedView DWORD value to 0.

For Office 2016

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 2.

  3. Set the OpenInProtectedView DWORD value to 0.

For Office 2019

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 2.

  3. Set the OpenInProtectedView DWORD value to 0.

For Office 2021

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 2.

  3. Set the OpenInProtectedView DWORD value to 0.

How to undo the workaround

For Office 2013

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 0.

  3. Leave the OpenInProtectedView DWORD value set to 0.

For Office 2016

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 0.

  3. Set the OpenInProtectedView DWORD value to 0.

For Office 2019

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 0.

  3. Set the OpenInProtectedView DWORD value to 0.

For Office 2021

  1. Run regedit.exe as Administrator and navigate to the following subkey:

    `[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]`

  2. Set the RtfFiles DWORD value to 0.

  3. Set the OpenInProtectedView DWORD value to 0.

FAQ

What is the attack vector for this vulnerability?

An unauthenticated attacker could send a malicious e-mail containing an RTF payload that would allow them to gain access to execute commands within the application used to open the malicious file.

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.

I am running SharePoint Enterprise Server 2013 Service Pack 1. Do I need to install all the updates that are listed for SharePoint Enterprise Server 2013 Service Pack 1?

No. Customers running SharePoint Enterprise Server 2013 Service Pack 1 should install either of the following:

  • Cumulative update (ubersrv13). Note that this update also includes the *srvloc2013 update
  • Both of the security updates (sts2013 AND *loc2013), which are the same updates as for Foundation Server 2013

Please note that this is a clarification of the existing servicing model for SharePoint Server 2013 and applies for all previous updates.

I am running SharePoint Foundation 2013 Service Pack 1. Do I need to install all the updates that are listed for SharePoint Foundation 2013 Service Pack 1 ?

Yes, customers running SharePoint Foundation 2013 Service Pack 1 should install both of the security updates. The updates can be installed in any order.

Обновления

ПродуктСтатьяОбновление
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 RT Service Pack 1
-
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Word 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Office 2019 for 32-bit editions
-

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 100%
0.91148
Критический

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

Microsoft Word Remote Code Execution Vulnerability

CVSS3: 9.8
github
почти 3 года назад

Microsoft Word Remote Code Execution Vulnerability

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость текстового редактора Microsoft Word, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.91148
Критический

9.8 Critical

CVSS3