Fortinet Discovers Microsoft Office Outlook Remote Code Execution Vulnerability
Fortinet's FortiGuard Labs has discovered a remote code execution vulnerability in Microsoft Outlook.
Microsoft Outlook is a personal information manager, which is a part of the Microsoft Office suite. Although it is used mainly as an email application, it also includes a calendar, task manager, contact manager, note taking, journal, and web browsing.
A remote code execution vulnerability exists in Microsoft Outlook resulting from its failure to properly handle objects in memory. To exploit the vulnerability, a user must open a specially crafted RWZ file with an affected version of Microsoft Outlook. An attacker who successfully exploited the vulnerability could perform actions in the security context of the current user.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Dec 06, 2018
Users should apply the solution provided by Microsoft.
Fortinet reported the vulnerability to Microsoft on September 29, 2018.
Microsoft confirmed the vulnerability on October 8, 2018.
Microsoft patched the vulnerability on December 11, 2018.
This vulnerability was discovered by Yonghui Han of Fortinet's FortiGuard Labs.