CVE-2014-1761
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
Analysis
Microsoft Word 2003 through 2013 contain a memory corruption vulnerability in RTF file parsing that allows remote code execution, exploited as a zero-day in targeted attacks against government and military organizations.
Technical Context
The CWE-787 out-of-bounds write occurs when Word parses certain RTF control words with malformed parameters. The corruption in the heap allows attackers to overwrite adjacent objects and hijack execution flow. RTF files were particularly dangerous because Outlook used Word as its email renderer.
Affected Products
['Microsoft Word 2003 SP3', 'Microsoft Word 2007 SP3', 'Microsoft Word 2010 SP1/SP2', 'Microsoft Word 2013/RT SP1', 'Microsoft Word for Mac 2011', 'Office Compatibility Pack SP3', 'SharePoint Server Word Automation Services']
Remediation
Apply Microsoft security update MS14-017. Disable RTF rendering in Outlook. Configure Office to open RTF files in Protected View. Block RTF files at email gateways.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today