【漏洞通告】Microsoft Word遠程代碼執(zhí)行漏洞(CVE-2023-21716)
發(fā)布時間:2023-03-07
閱讀次數(shù): 818 次
Microsoft Office Word是微軟公司的一個文字處理器應用程序。Word給用戶提供了用于創(chuàng)建專業(yè)而優(yōu)雅的文檔工具。美創(chuàng)安全實驗室監(jiān)測到Microsoft Word遠程代碼執(zhí)行漏洞的PoC在互聯(lián)網(wǎng)上公開,漏洞編號:CVE-2023-21716,漏洞等級:高危。該漏洞存在于Microsoft Word的RTF解析器(wwlib)中,是一個遠程代碼執(zhí)行漏洞,攻擊者可以制作包含過多字體表項的RTF文件,并誘導用戶打開來利用此漏洞。攻擊者可利用多種方式誘導用戶下載并打開特制文檔,如電子郵件、即時消息等等。用戶使用預覽窗格也會觸發(fā)此漏洞。成功利用此漏洞可能在目標系統(tǒng)上以該用戶權(quán)限執(zhí)行代碼。Microsoft Office 2019 for 32-bit editionsMicrosoft Office 2019 for 64-bit editionsMicrosoft Word 2013 Service Pack 1 (64-bit editions)Microsoft Word 2013 RT Service Pack 1Microsoft Word 2013 Service Pack 1 (32-bit editions)Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft Office Web Apps Server 2013 Service Pack 1Microsoft Word 2016 (32-bit edition)Microsoft Word 2016 (64-bit edition)Microsoft SharePoint Server 2019Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Office 2019 for MacMicrosoft Office Online ServerSharePoint Server Subscription Edition Language PackMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft SharePoint Server Subscription EditionMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC for Mac 2021目前該漏洞已在微軟2023年2月補丁中修復,受影響用戶可盡快安裝更新。
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21716