Microsoft Office is an office software suite based on the Windows operating system, including Word, Excel, etc. Microsoft Graph is a component for document insertion and charts and graphs editing. Recently, Microsoft fixed a remote code execution vulnerability in Office.
CVE-2018-8157: This vulnerability is due to incorrect verification of PaletteRecord when processing Office BIFF3 version (Binary Swap File Format) Chart Sheet Substream. Hackers can send specially designed files to users through e-mail attacks. If a user opens a file with a vulnerable version of Office, the hackers will execute arbitrary code in the current user context.
Vulnerability Source: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8157
- Microsoft Office 2010 Service Pack 2
- Microsoft Office 2013 RT Service Pack 1
- Microsoft Office 2013 Service Pack 1
- Microsoft Office 2016
- Microsoft Office 2016 Click-to-Run (C2R)
Update the bug fix release provided by Microsoft to eliminate the damage caused by the vulnerability.
Avoid clicking on attachments or links from untrusted sources in suspicious emails.
Official statement: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8157
[Hillstone Networks Solution]
Hillstone Networks has added signatures to the IPS signature database version 2.1.242. By deploying any Hillstone Networks solution with the IPS function, the Microsoft Office Graph Chart Out-Of-Bounds Write vulnerability can be quickly detected and effectively intercepted, preventing the server from being attacked.
Threat Events Detected by Hillstone Solutions
Vulnerability Detail Description