Overview
Microsoft OLE uses the URL Moniker to open application data based on the server-provided MIME type, which can allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft OLE uses the URL Moniker to processes remotely-linked content in a vulnerable manner. The remote content is opened based on the application associated with the server-provided MIME type. Some MIME types are dangerous, as they can result in code execution. For example, the application/hta mime type is associated with mshta.exe. Opening arbitrary HTA content is equivalent to executing arbitrary code. This vulnerability is reportedly being exploited in the wild. The exploits used in the wild have the following characteristics:
This vulnerability is reportedly being exploited in the wild. |
Impact
By convincing a user to open a specially-crafted document, an unauthenticated remote attacker may be able to execute arbitrary code on a vulnerable system. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. Please consider the following workarounds; |
Apply an update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Temporal | 6.8 | E:F/RL:W/RC:C |
Environmental | 6.8 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199
- https://www.fireeye.com/blog/threat-research/2017/04/acknowledgement_ofa.html
- https://securingtomorrow.mcafee.com/mcafee-labs/critical-office-zero-day-attacks-detected-wild/
- https://blog.nviso.be/2017/04/12/analysis-of-a-cve-2017-0199-malicious-rtf-document/
- https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler-vulnerability/
- https://support.office.com/en-us/article/What-is-Protected-View-d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653
- https://support.office.com/en-us/article/What-is-File-Block-10d0e0ab-fecf-4605-befd-1e6563e7686d
Acknowledgements
Public exploitation of this vulnerability was reported by McAfee and FireEye.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2017-0199 |
Date Public: | 2017-04-07 |
Date First Published: | 2017-04-10 |
Date Last Updated: | 2017-04-13 15:14 UTC |
Document Revision: | 65 |