MS.Office.EQNEDT32.EXE.Equation.Parsing.Memory.Corruption

description-logoDescription

This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Office.
The vulnerability is due to an error when "EQNEDT32.EXE" handles a maliciously crafted equation. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted office file.

description-logoOutbreak Alert

FortiGuard Labs captured a phishing campaign that spreads a new Agent Tesla variant. This well-known malware family uses a .Net-based Remote Access Trojan (RAT) and data stealer to gain initial access by exploiting vulnerabilities Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802. The Agent Tesla core module can collect sensitive information from the victim’s device that may include the saved credentials, keylogging information, and device screenshots..

View the full Outbreak Alert Report

affected-products-logoAffected Products

Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2025-05-15 32.009
Modified
Sig Added
2025-01-30 29.946
Modified
Sig Added
2025-01-22 29.941
Modified
Sig Added
2025-01-15 29.937
Modified
Sig Added
2025-01-07 29.932
Modified
2024-12-18 29.923
Modified
Sig Added
2024-12-10 29.918
Modified
Sig Added
2024-11-12 29.901
Modified
Sig Added
2024-09-12 28.863
Modified
Sig Added
2024-09-09 28.860
Modified
Sig Added