MS.Office.Word.File.Handling.Use.After.Free
Description
This indicates an attack attempt against a remote Code Execution vulnerability in Microsoft Office.
The vulnerability is caused by an error when the vulnerable software handles a specially crafted DOC file. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted DOC file.
Affected Products
Microsoft Word for Mac 2011
Microsoft Word 2007 Service Pack 3
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 RT Service Pack 1
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft Office Web Apps Server 2010 Service Pack 2
Microsoft Word 2016 for Mac
Microsoft Word 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Office Compatibility Pack Service Pack 3
Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8509
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-02-01 | 14.540 | Name:Microsoft. Office. Word. File. Handling. Use. After. Free:MS. Office. Word. File. Handling. Use. After. Free |