CVE-2015-1641

HIGH
2015-04-14 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 00:15 cisa
CISA KEV
Patch Released
Oct 22, 2025 - 00:15 nvd
Patch available
CVE Published
Apr 14, 2015 - 20:59 nvd
HIGH 7.8

Description

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."

Analysis

Microsoft Word 2007 through 2013 and SharePoint components contain a memory corruption vulnerability in RTF processing that allows remote code execution, heavily exploited by multiple APT groups throughout 2015-2017.

Technical Context

The CWE-787 out-of-bounds write in Word's RTF parser is triggered by malformed RTF control words that cause heap corruption. The exploit achieves reliable code execution through precise heap manipulation, and works when RTF is rendered by Word, Outlook (which uses Word for rendering), and SharePoint.

Affected Products

['Microsoft Word 2007 SP3', 'Microsoft Word 2010 SP2', 'Microsoft Word 2013 SP1/RT SP1', 'Microsoft Word for Mac 2011', 'SharePoint Server Word Automation Services', 'Office Web Apps Server']

Remediation

Apply Microsoft security update MS15-033. Disable RTF rendering in Outlook. Block RTF at email gateways. Enable Protected View for all external documents.

Priority Score

193
Low Medium High Critical
KEV: +50
EPSS: +93.6
CVSS: +39
POC: 0

Share

CVE-2015-1641 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy