SB2025101469 - Multiple vulnerabilities in Microsoft Inbox COM Objects (Global Memory) 



SB2025101469 - Multiple vulnerabilities in Microsoft Inbox COM Objects (Global Memory)

Published: October 14, 2025

Security Bulletin ID SB2025101469
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2025-58732)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


2) Use-after-free (CVE-ID: CVE-2025-58738)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


3) Use-after-free (CVE-ID: CVE-2025-58736)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


4) Use-after-free (CVE-ID: CVE-2025-58734)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


5) Use-after-free (CVE-ID: CVE-2025-58733)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


6) Use-after-free (CVE-ID: CVE-2025-58731)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


7) Use-after-free (CVE-ID: CVE-2025-58730)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


8) Use-after-free (CVE-ID: CVE-2025-58735)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Inbox COM Objects (Global Memory). A remote attacker can trick a victim to open a specially crafted file, win a race condition and execute arbitrary code on the target system.


Remediation

Install update from vendor's website.