CVE-2015-1641
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."
Analysis
Microsoft Word 2007 through 2013 and SharePoint components contain a memory corruption vulnerability in RTF processing that allows remote code execution, heavily exploited by multiple APT groups throughout 2015-2017.
Technical Context
The CWE-787 out-of-bounds write in Word's RTF parser is triggered by malformed RTF control words that cause heap corruption. The exploit achieves reliable code execution through precise heap manipulation, and works when RTF is rendered by Word, Outlook (which uses Word for rendering), and SharePoint.
Affected Products
['Microsoft Word 2007 SP3', 'Microsoft Word 2010 SP2', 'Microsoft Word 2013 SP1/RT SP1', 'Microsoft Word for Mac 2011', 'SharePoint Server Word Automation Services', 'Office Web Apps Server']
Remediation
Apply Microsoft security update MS15-033. Disable RTF rendering in Outlook. Block RTF at email gateways. Enable Protected View for all external documents.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today