Vulnerability identifier: #VU8303
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Windows
Operating systems & Components /
Operating system
Windows Server
Operating systems & Components /
Operating system
Microsoft Office for Mac
Client/Desktop applications /
Office applications
Microsoft Office
Client/Desktop applications /
Office applications
Microsoft Word
Client/Desktop applications /
Office applications
Skype for Business
Client/Desktop applications /
Messaging software
Microsoft Lync
Client/Desktop applications /
Messaging software
Microsoft Live Meeting
Client/Desktop applications /
Messaging software
Lync Attendee
Client/Desktop applications /
Messaging software
Vendor: Microsoft
Description
The vulnerability allows a local user to obtain potentially sensitive information.
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. A local user can gain access to potentially sensitive information.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Windows: 7, 8.1 RT - 8.1, 10
Windows Server: 2008 R2 - 2008, 2012 R2 - 2012, 2016 10.0.14393.10
Microsoft Office for Mac: 2011 - 2016
Microsoft Office: 2007, 2010 Service Pack 2
Microsoft Word: Viewer
Skype for Business: 2016
Microsoft Lync: 2010, 2013
Microsoft Live Meeting: 2007 Add-in - 2007 Console
Lync Attendee: 2010
External links
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8676
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.