Overview
Microsoft Equation Editor contains a stack buffer overflow, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft Equation Editor is a component that comes with Microsoft Office. It is an out-of-process COM server that is hosted by eqnedt32.exe. The Microsoft Equation Editor contains a stack buffer overflow vulnerability. Memory corruption vulnerabilities in modern software are often mitigated by exploit protections, such as DEP and ASLR. More modern memory corruption protections include features like CFG. Even in a modern, fully-patched Microsoft Office 2016 system, the Microsoft Equation Editor lacks any exploit protections, however. This lack of exploit protections allows an attacker to achieve code execution more easily than if protections were in place. For example, because eqnedt32.exe was linked without the /DYNAMICBASE flag, it will not be loaded at a randomized location by default. |
Impact
By convincing a user to open a specially-crafted Office document, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the logged-on user. |
Solution
Apply an update |
Disable Microsoft Equation Editor in Office |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Temporal | 5.5 | E:U/RL:OF/RC:C |
Environmental | 5.5 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882
- https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about
- https://blogs.technet.microsoft.com/srd/2017/08/09/moving-beyond-emet-ii-windows-defender-exploit-guard/
- https://msdn.microsoft.com/en-us/library/bb430720.aspx?f=255&MSPPError=-2147217396
- https://msdn.microsoft.com/en-us/library/windows/desktop/mt637065(v=vs.85).aspx
- https://msdn.microsoft.com/en-us/library/windows/desktop/ms683835(v=vs.85).aspx
- https://www.microsoft.com/en-us/download/details.aspx?id=54264
- https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
- https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction
Acknowledgements
This issue was reported by Microsoft, who in turn credit Denis Selianin of Embedi with discovery.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2017-11882 |
Date Public: | 2017-11-14 |
Date First Published: | 2017-11-15 |
Date Last Updated: | 2017-11-20 20:03 UTC |
Document Revision: | 25 |