MSOffice/CVE_2017_11882.B!exploit

description-logoAnalysis



MSOffice/CVE_2017_11882.B!exploit detects Microsoft Office documents that may be exploiting a memory corruption vulnerability in the EQNEDT32.EXE executable that can be invoked via an older suite of Microsoft Office of products. For more details, please visist: CVE 2017-11882 exploit

  • Most commonly encountered is a Rich-Text Format (RTF) file with the extension .rtf. An example of a file may look like:

  • When the file is run in MS Word or Wordpad, a call to a domain may be triggered. The following domain have been observed:
    • grerno{Removed}.com
    • my-christmastr{Removed}.com
    • plantatulap{Removed}.cl
    • myined{Removed}.kozow.com
    • tainguyensaefo{Removed}.com
    • obilo{Removed}.info
    • nm{Removed}.net.au
    • kzkoicaalum{Removed}.com
    • axxxa{Removed}.com
    • connauqhtmot{Removed}.com
    • menorasarai{Removed}.info
    • bijou-cinem{Removed}.com
    • verificati{Removed}.zabros.com.au
    • justlo{Removed}.com
    • destinylo{Removed}.tk
    • apelev{Removed}.ro
    • obilo{Removed}.info
    • alexboolooobin{Removed}.info

recommended-action-logoRecommended Action

  • Make sure that your FortiGate/FortiClient system is using the latest AV database.
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.
  • Download and install the patch for the CVE-2017-11882 Vulnerability at Microsoft Office Memory Corruption Vulnerability.

Detection Availability

FortiGate
FortiClient
FortiAPS
FortiAPU
FortiMail
FortiSandbox
FortiWeb
FortiADC
FortiIsolator
FortiDeceptor
FortiEDR

Version Updates

Date Version Status Detail
2023-04-03 91.02022
Modified
2023-01-17 90.09734
Modified
2022-07-19 90.04286
Modified
2022-06-14 90.03243
Modified
2022-05-25 90.02622
Modified
2022-05-24 90.02594
Modified
2022-05-03 90.01962
Modified
2022-03-29 90.00912
Modified
2021-12-28 89.08183
Modified
2021-10-12 89.05871
Modified