A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972 | Exploit Third Party Advisory |
Configurations
History
22 Aug 2025, 21:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972 - Exploit, Third Party Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972 - Exploit, Third Party Advisory | |
First Time |
Microsoft
Microsoft outlook |
|
CPE | cpe:2.3:a:microsoft:outlook:16.83.3:*:*:*:*:macos:*:* |
19 Dec 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-18 23:15
Updated : 2025-08-22 21:29
NVD link : CVE-2024-42220
Mitre link : CVE-2024-42220
CVE.ORG link : CVE-2024-42220
JSON object : View
Products Affected
microsoft
- outlook
CWE
CWE-347
Improper Verification of Cryptographic Signature