SB2025101469 - Multiple vulnerabilities in Microsoft Inbox COM Objects (Global Memory)
Published: October 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2025-58732)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
2) Use-after-free (CVE-ID: CVE-2025-58738)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
3) Use-after-free (CVE-ID: CVE-2025-58736)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
4) Use-after-free (CVE-ID: CVE-2025-58734)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
5) Use-after-free (CVE-ID: CVE-2025-58733)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
6) Use-after-free (CVE-ID: CVE-2025-58731)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
7) Use-after-free (CVE-ID: CVE-2025-58730)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
8) Use-after-free (CVE-ID: CVE-2025-58735)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58732
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58738
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58736
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58734
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58733
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58731
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58730
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58735