Summary
This host is missing a critical security update according to Microsoft Bulletin MS14-017.
Impact
Successful exploitation will allow remote attackers to execute the arbitrary code, cause memory corruption and compromise the system.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms14-017
Insight
Multiple flaws are due to an error within,
- Microsoft Word when handling certain RTF-formatted data can be exploited to corrupt memory.
- Microsoft Office File Format Converter when handling certain files can be exploited to corrupt memory.
- Microsoft Word when handling certain files can be exploited to cause a stack-based buffer overflow.
Affected
Microsoft Word 2013
Microsoft Word 2003 Service Pack 3 and prior
Microsoft Word 2007 Service Pack 3 and prior
Microsoft Word 2010 Service Pack 2 and prior.
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2014-1757, CVE-2014-1758, CVE-2014-1761 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft IIS FTP Server 'Malformed FTP List Request' DOS Vulnerability
- Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
- Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
- .NET JIT Compiler Vulnerability