Intrusion Prevention

MS.Office.RTF.parser.OLE2.Handling.Code.Execution

Description

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.
The vulnerability is due to improper handling of a certain component when the vulnerable software attempts to access a specially crafted RTF file. An attacker can exploit this to execute arbitrary code within the context of the logged in user via a crafted RTF file.

Affected Products

Microsoft Word 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
Microsoft Word for Mac 2011
Microsoft Word 2016 for Mac
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Word Viewer

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://technet.microsoft.com/security/bulletin/MS16-121

CVE References

CVE-2016-7193