Select Page

Jun 22, 2018

Vulnerability Notification: Microsoft Office Graph Chart Out-Of-Bounds Write

by

[dssb_sharing_buttons icon_placement_tablet=”icon” icon_placement_phone=”icon” icon_placement_last_edited=”on|phone” _builder_version=”4.22.0″ _module_preset=”default” width_tablet=”” width_phone=”86%” width_last_edited=”on|tablet” module_alignment=”center” module_alignment_tablet=”center” module_alignment_phone=”center” module_alignment_last_edited=”on|tablet” global_colors_info=”{}” locked=”off” theme_builder_area=”post_content”][dssb_sharing_button social_network=”linkedin” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][/dssb_sharing_button][dssb_sharing_button social_network=”twitter” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][/dssb_sharing_button][dssb_sharing_button social_network=”email” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][/dssb_sharing_button][/dssb_sharing_buttons]

[Overview]

Microsoft Office is an office software suite based on the Windows operating system, including Word, Excel, etc. Microsoft Graph is a component for document insertion and charts and graphs editing. Recently, Microsoft fixed a remote code execution vulnerability in Office.

[Vulnerability Details]

CVE-2018-8157: This vulnerability is due to incorrect verification of PaletteRecord when processing Office BIFF3 version (Binary Swap File Format) Chart Sheet Substream. Hackers can send specially designed files to users through e-mail attacks. If a user opens a file with a vulnerable version of Office, the hackers will execute arbitrary code in the current user context.

Vulnerability Source: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8157

[Severity]

Critical

[Affected Version]

  • Microsoft Office 2010 Service Pack 2
  • Microsoft Office 2013 RT Service Pack 1
  • Microsoft Office 2013 Service Pack 1
  • Microsoft Office 2016
  • Microsoft Office 2016 Click-to-Run (C2R)

[Suggestions]

Update the bug fix release provided by Microsoft to eliminate the damage caused by the vulnerability.

Avoid clicking on attachments or links from untrusted sources in suspicious emails.

Official statement: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8157

[Hillstone Networks Solution]

Hillstone Networks has added signatures to the IPS signature database version 2.1.242. By deploying any Hillstone Networks solution with the IPS function, the Microsoft Office Graph Chart Out-Of-Bounds Write vulnerability can be quickly detected and effectively intercepted, preventing the server from being attacked.

Threat Events Detected by Hillstone Solutions

 

 

Vulnerability Detail Description

 

[dssb_sharing_buttons icon_placement_tablet=”icon” icon_placement_phone=”icon” icon_placement_last_edited=”on|phone” _builder_version=”4.22.0″ _module_preset=”default” width_tablet=”” width_phone=”86%” width_last_edited=”on|tablet” module_alignment=”center” module_alignment_tablet=”center” module_alignment_phone=”center” module_alignment_last_edited=”on|tablet” global_colors_info=”{}” locked=”off” theme_builder_area=”post_content”][dssb_sharing_button social_network=”linkedin” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][/dssb_sharing_button][dssb_sharing_button social_network=”twitter” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][/dssb_sharing_button][dssb_sharing_button social_network=”email” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][/dssb_sharing_button][/dssb_sharing_buttons]