Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2017-11882
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Office 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Office 2007 SP3等都是美国微软(Microsoft)公司开发的办公软件套件产品。 Microsoft Office中存在远程代码执行漏洞,该漏洞源于程序没有正确的处理内存中的对象。远程攻击者可借助特制的文件利用该漏洞在当前用户的上下文中执行任意代码。以下版本受到影响:Microsoft Office 2007 SP3,Microsoft Office 2010 SP2,Microsoft Office 2013 SP1,Microsoft Office 2016。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Microsoft CorporationMicrosoft Office Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, Microsoft Office 2016 -
II. Public POCs for CVE-2017-11882
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/zhouat/cve-2017-11882POC Details
2Proof-of-Concept exploits for CVE-2017-11882https://github.com/embedi/CVE-2017-11882POC Details
3CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882https://github.com/Ridter/CVE-2017-11882POC Details
4CVE-2017-11882 File Generator PoChttps://github.com/BlackMathIT/2017-11882_GeneratorPOC Details
5CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.https://github.com/rip1s/CVE-2017-11882POC Details
6This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.https://github.com/0x09AL/CVE-2017-11882-metasploitPOC Details
7CVE-2017-11882https://github.com/HZachev/ABCPOC Details
8CVE-2017-11882 exploitationhttps://github.com/starnightcyber/CVE-2017-11882POC Details
9Nonehttps://github.com/Grey-Li/CVE-2017-11882POC Details
10# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to /usr/share/metasploit-framework/modules/exploits/windows/local/ 2) Copy the cve-2017-11882.rtf to /usr/share/metasploit-framework/data/exploits/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.https://github.com/legendsec/CVE-2017-11882-for-KaliPOC Details
11Nonehttps://github.com/CSC-pentest/cve-2017-11882POC Details
12Nonehttps://github.com/Shadowshusky/CVE-2017-11882-POC Details
13PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)https://github.com/rxwx/CVE-2018-0802POC Details
14PoC for CVE-2018-0802 And CVE-2017-11882https://github.com/Ridter/RTF_11882_0802POC Details
15Nonehttps://github.com/likescam/CVE-2017-11882POC Details
16Nonehttps://github.com/likescam/CVE-2018-0802_CVE-2017-11882POC Details
17Nonehttps://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-MalspamPOC Details
18Empire Port of CVE-2017-11882https://github.com/ChaitanyaHaritash/CVE-2017-11882POC Details
19Nonehttps://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-POC Details
20Nonehttps://github.com/j0lama/CVE-2017-11882POC Details
21Microsoft Equation 3.0/Convert python2 to python3https://github.com/chanbin/CVE-2017-11882POC Details
22CVE-2017-11882(通杀Office 2003到2016)https://github.com/littlebin404/CVE-2017-11882POC Details
23Simple Overflow demo, like CVE-2017-11882 exphttps://github.com/ekgg/Overflow-Demo-CVE-2017-11882POC Details
24Nonehttps://github.com/HaoJame/CVE-2017-11882POC Details
25generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.https://github.com/5l1v3r1/rtfkitPOC Details
26Nonehttps://github.com/ActorExpose/CVE-2017-11882POC Details
27SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.https://github.com/Retr0-code/SignHerePOC Details
28Nonehttps://github.com/lisinan988/CVE-2017-11882-expPOC Details
29Nonehttps://github.com/tzwlhack/CVE-2017-11882POC Details
30CVE-2017-11882复现https://github.com/Sunqiz/CVE-2017-11882-reproductionPOC Details
31Pada bulan maret 2023, terdapat sample baru yang terindentifikasi sebagai malware. Malware tersebut berasal dari file berekstensi.xls dan .doc dan dikenal dengan nama “Bank Slip.xls”. Aktivitas malware tersebut memiliki hubungan dengan kerentanan yang dikenal dengan id CVE-2017-11882 dan CVE-2018-0802. https://github.com/Abdibimantara/Maldoc-AnalysisPOC Details
32Nonehttps://github.com/n18dcat053-luuvannga/DetectPacket-CVE-2017-11882POC Details
33Nonehttps://github.com/nhuynhuy/cve-2017-11882POC Details
34Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically, exploring the exploitation of vulnerability CVE-2017-11882. https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-AnalysisPOC Details
35Nonehttps://github.com/likekabin/CVE-2017-11882POC Details
36Nonehttps://github.com/likekabin/CVE-2018-0802_CVE-2017-11882POC Details
37Malware Analysis CVE-2017-11882https://github.com/yaseenibnakhtar/Malware-Analysis-CVE-2017-11882POC Details
38Malware Analysis CVE-2017-11882https://github.com/yaseenibnakhtar/001-Malware-Analysis-CVE-2017-11882POC Details
39CVE-2017-11882 Preventer for .docx fileshttps://github.com/xdrake1010/CVE-2017-11882-PreventerPOC Details
40Simple PoC of CVE-2017-11882https://github.com/imkidz0/CVE-2017-11882POC Details
41Proof-of-Concept exploits for CVE-2017-11882https://github.com/futureFfff/CVE-2017POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2017-11882
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2017-11882

No comments yet


Leave a comment