7.5
CVSSv3

CVE-2020-16947

Published: 16/10/2020 Updated: 31/12/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the targeted user. If the targeted user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Outlook software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>Note that where severity is indicated as Critical in the Affected Products table, the Preview Pane is an attack vector.</p> <p>The security update addresses the vulnerability by correcting how Outlook handles objects in memory.</p>

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft outlook 2016

microsoft office 2019

microsoft 365 apps -

Github Repositories

Outlook 2019 Remote Command Execution

CVE-2020-16947 Outlook 2019&nbsp;Remote Command Execution This bug occured when parsing html contents if attacker successfully executes this exploit, it can lead to remote command execution When copying strings out of the ascii range among html contents, the corresponding string is replaced with 0xfffd As a result, the size of the copied string doubles, so despite the sa

CVE-2020-16947 This vulnerability occurs in Outlook 2019 (1601323120262) installed on Windows 10 1909 x64 TLDR; I found this bug usng winafl fuzzer This bug occured when parsing html contents if attacker successfully executes this exploit, it can lead to remote command execution Details 0:000&gt; r rax=0000000000000000 rbx=0000021c99ce9eb0 rcx=0000021c99ce9eb0 rdx=000

PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)

CVE-2020-16947 This vulnerability occurs in Outlook 2019 (1601323120262) installed on Windows 10 1909 x64 TLDR; I found this bug using winafl fuzzer This bug occured when parsing html contents if attacker successfully executes this exploit, it can lead to remote command execution Details 0:000&gt; r rax=0000000000000000 rbx=0000021c99ce9eb0 rcx=0000021c99ce9eb0 rdx=00

Recent Articles

It's 2020 and a rogue ICMPv6 network packet can pwn your Microsoft Windows machine
The Register • Thomas Claburn in San Francisco • 13 Oct 2020

Redmond urges folks to apply update ASAP – plus more fixes for Outlook and software from Adobe, Intel, SAP, Red Hat The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems open

Patch Tuesday Microsoft's Update Tuesday patch dump for October 2020 has delivered security patches that attempt to address 87 CVEs for a dozen Redmond products. Nadella's security crew has identified 22 remote code execution (RCE) CVEs though the most worrisome looks like CVE-2020-16898, Windows TCP/IP RCE, which is rated 9.8 out 10 in severity. It affects Windows desktop and server systems. According to Microsoft, the Windows TCP/IP stack doesn't properly handle ICMPv6 Router Advertisement pac...