Vulnerability identifier: #VU1215
Vulnerability risk: Critical
CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Works Suite
Client/Desktop applications /
Other client software
Microsoft Office
Client/Desktop applications /
Office applications
Microsoft Office for Mac
Client/Desktop applications /
Office applications
Word Viewer
Client/Desktop applications /
Office applications
Vendor:
Microsoft
Description
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability is caused by boundary error when processing an unchecked word count in Word files. A remote attacker can create a specially crafted Word file, trick the victim into opening it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Mitigation
Microsoft Office 2000 Service Pack 3
Microsoft Word 2000 - Download the update (KB929139)
Microsoft Office XP Service Pack 3
Microsoft Word 2002 - Download the update (KB929061)
Microsoft Office 2003 Service Pack 2
Microsoft Word 2003 - Download the update (KB929057)
Microsoft Word Viewer 2003 - Download the update (KB924883)
Microsoft Works Suites
Microsoft Works Suite 2004 - Download the update (KB929061) (same as the Microsoft Word 2002 update)
Microsoft Works Suite 2005 - Download the update (KB929061) (same as the Microsoft Word 2002 update)
Microsoft Works Suite 2006 - Download the update (KB929061) (same as the Microsoft Word 2002 update)
Microsoft Office 2004 for Mac
Microsoft Office 2004 for Mac - Download the update (KB932185)Vulnerable software versions
:
Works Suite: 2004 - 2006
Microsoft Office:
Microsoft Office for Mac: 2004
Word Viewer: 2003
External links
http://technet.microsoft.com/library/security/ms07-014
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.