CVE-2017-8682
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/09/2017
Last modified:
20/04/2025
Description
Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, Windows Server 2016, Microsoft Office Word Viewer, Microsoft Office 2007 Service Pack 3 , and Microsoft Office 2010 Service Pack 2 allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8683.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:office_2007:-:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_2010:-:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:* | ||
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* | ||
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/100772
- http://www.securitytracker.com/id/1039352
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8682
- https://www.exploit-db.com/exploits/42744/
- http://www.securityfocus.com/bid/100772
- http://www.securitytracker.com/id/1039352
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8682
- https://www.exploit-db.com/exploits/42744/