MS.Outlook.CVE-2018-8522.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Microsoft Outlook email client.
The vulnerability is due to a error when parsing the contents of a rule file. A remote attacker could exploit this to execute arbitrary code execution within the context of the application, via a crafted rule file.
Affected Products
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
Microsoft Outlook 2016 (32-bit edition)
Microsoft Outlook 2016 (64-bit edition)
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Office 365 ProPlus for 32-bit Systems
Office 365 ProPlus for 64-bit Systems
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8522
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2018-11-27 | 13.498 | Default_action:pass:drop |
2018-11-14 | 13.490 | Name:Microsoft. Outlook. CVE-2018-8522. Memory. Corruption:MS. Outlook. CVE-2018-8522. Remote. Code. Execution |
2018-11-13 | 13.489 | Name:FG-VD-18-134_Microsoft. 0day:Microsoft. Outlook. CVE-2018-8522. Memory. Corruption |
2018-10-26 | 13.480 |