Did Microsoft Just Manually Patch Their Equation Editor Executable? Why Yes, Yes They Did. (CVE-2017-11882)
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Software - T1592.002 Tool - T1588.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | df571ffe-8fbb-436a-8835-bfaae1fee6e5 |
Fingerprint | 36162817e061cfc3 |
Analysis status | IN_PROGRESS |
Considered CTI value | 0 |
Text language | |
Published | Nov. 17, 2017, 2:46 a.m. |
Added to db | Jan. 18, 2023, 8:01 p.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | 0patch Blog |
Title | Did Microsoft Just Manually Patch Their Equation Editor Executable? Why Yes, Yes They Did. (CVE-2017-11882) |
Detected Hints/Tags/Attributes | 40/1/11 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 375 | cve-2017-11882 |
|
Details | Domain | 622 | en.wikipedia.org |
|
Details | Domain | 1 | jeffpar.github.io |
|
Details | Domain | 5 | image.save |
|
Details | File | 57 | eqnedt32.exe |
|
Details | File | 33 | wwlib.dll |
|
Details | File | 2 | mfc40.dll |
|
Details | IPv4 | 2 | 0.11.9.0 |
|
Details | IPv4 | 3 | 17.8.14.0 |
|
Details | Url | 1 | https://en.wikipedia.org/wiki/mathtype |
|
Details | Url | 1 | https://jeffpar.github.io/kbarchive/kb/231/q231327 |