CVE-2019-1034

5 documents5 sources
Severity
7.8HIGH
EPSS
13.2%
top 5.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateMay 24

Description

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected versio

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages19 packages

CVEListV5microsoft/microsoft_word_201616.0.1publication
CVEListV5microsoft/microsoft_word_2010_service_pack_213.0.0.0publication
CVEListV5microsoft/microsoft_word_2013_service_pack_115.0.1publication
NVDmicrosoft/word2010, 2013, 2016+2
CVEListV5microsoft/office_365_proplus16.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rvm2-34hm-23fm: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote2022-05-24
CVEList
Microsoft Word Remote Code Execution Vulnerability2019-06-12

💥Exploits & PoCs

1
Exploit-DB
Kramer VIAware 2.5.0719.1034 - Remote Code Execution (RCE)2022-03-30

📋Vendor Advisories

1
Microsoft
Microsoft Word Remote Code Execution Vulnerability2019-06-11