
During the analysis, Dormann first came across an error that forces the system into a BlueScreen loop. Dormann documented this vulnerability within his blog post Automatically Stealing Password Hashes with Microsoft Outlook and OLE. The security update addresses the vulnerability by correcting how Office processes OLE objects.ĬVE-2018-0950 in Microsoft Outlook has been found by Will Dormann. A connection to a remote SMB server could then be automatically initiated, enabling the attacker to brute-force attack the corresponding NTLM challenge and response in order to disclose the corresponding hash password. To exploit the vulnerability, an attacker would have to send an RTF-formatted email to a user and convince the user to open or preview the email. This vulnerability could potentially result in the disclosure of sensitive information to a malicious site. Microsoft addresses the CVE-2018-0950 vulnerability in Microsoft Outlook within the Security TechCenter:Īn information disclosure vulnerability exists when Office renders Rich Text Format (RTF) email messages containing OLE objects when a message is opened or previewed. CVE-2018-0950 vulnerability in Microsoft Outlook
