{"containers":{"cna":{"affected":[{"product":"Microsoft Outlook","vendor":"Microsoft Corporation","versions":[{"status":"affected","version":"Microsoft Outlook 2010 SP2"},{"status":"affected","version":"Outlook 2013 SP1 and RT SP1"},{"status":"affected","version":"Outlook 2016"}]}],"datePublic":"2017-10-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka \"Microsoft Outlook Security Feature Bypass Vulnerability.\""}],"problemTypes":[{"descriptions":[{"description":"Security Feature Bypass","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-07-11T18:16:14.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774"},{"name":"101098","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/101098"},{"name":"1039542","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1039542"},{"tags":["x_refsource_MISC"],"url":"https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","DATE_PUBLIC":"2017-10-10T00:00:00","ID":"CVE-2017-11774","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Microsoft Outlook","version":{"version_data":[{"version_value":"Microsoft Outlook 2010 SP2"},{"version_value":"Outlook 2013 SP1 and RT SP1"},{"version_value":"Outlook 2016"}]}}]},"vendor_name":"Microsoft Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka \"Microsoft Outlook Security Feature Bypass Vulnerability.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Security Feature Bypass"}]}]},"references":{"reference_data":[{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774","refsource":"CONFIRM","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774"},{"name":"101098","refsource":"BID","url":"http://www.securityfocus.com/bid/101098"},{"name":"1039542","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1039542"},{"name":"https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/","refsource":"MISC","url":"https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T18:19:39.015Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11774"},{"name":"101098","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/101098"},{"name":"1039542","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1039542"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2017-11774","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-10T14:45:34.549770Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-11774"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-11774","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-119","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"}]}],"timeline":[{"time":"2021-11-03T00:00:00.000Z","lang":"en","value":"CVE-2017-11774 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:55:31.465Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2017-11774","datePublished":"2017-10-13T13:00:00.000Z","dateReserved":"2017-07-31T00:00:00.000Z","dateUpdated":"2025-10-21T23:55:31.465Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}