{"containers":{"cna":{"title":"Microsoft Outlook Elevation of Privilege Vulnerability","datePublic":"2019-08-13T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Microsoft Office 2019","cpes":["cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"19.0.0","lessThan":"https://aka.ms/OfficeSecurityReleases","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Office 365 ProPlus","cpes":["cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"16.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Outlook 2016","cpes":["cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x86:*:*","cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x64:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"16.0.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Outlook 2013 Service Pack 1","cpes":["cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:x86:*:*","cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:*:x64:*","cpe:2.3:a:microsoft:outlook:2013:*:*:*:rt:*:*:*"],"platforms":["32-bit Systems","x64-based Systems","ARM64-based Systems"],"versions":[{"version":"15.0.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Outlook 2010 Service Pack 2","cpes":["cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"13.0.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"An elevation of privilege vulnerability exists when Microsoft Outlook initiates processing of incoming messages without sufficient validation of the formatting of the messages. An attacker who successfully exploited the vulnerability could attempt to force Outlook to load a local or remote message store (over SMB).\nTo exploit the vulnerability, the attacker could send a specially crafted email to a victim. Outlook would then attempt to open a pre-configured message store contained in the email upon receipt of the email.\nThis update addresses the vulnerability by ensuring Office fully validates incoming email formatting before processing message content.","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T16:51:04.255Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1204"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T18:13:29.173Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1204"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2019-1204","datePublished":"2019-08-14T20:55:05.000Z","dateReserved":"2018-11-26T00:00:00.000Z","dateUpdated":"2024-08-04T18:13:29.173Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}