CVE-2019-1035

6 documents6 sources
Severity
7.8HIGH
EPSS
12.8%
top 5.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateMay 24

Description

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected versio

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages8 packages

CVEListV5microsoft/office_365_proplus16.0.0publication
CVEListV5microsoft/microsoft_office_201919.0.0https://aka.ms/OfficeSecurityReleases
CVEListV5microsoft/microsoft_office_2016_for_mac16.0.0publication
CVEListV5microsoft/microsoft_office_2019_for_mac16.0.0publication
CVEListV5microsoft/microsoft_office_online_server16.0.1publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r62g-7h9x-gqvh: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote2022-05-24
CVEList
Microsoft Word Remote Code Execution Vulnerability2019-06-12

💥Exploits & PoCs

1
Exploit-DB
Web Companion versions 5.1.1035.1047 - 'WCAssistantService' Unquoted Service Path2019-10-17

📋Vendor Advisories

1
Microsoft
Microsoft Word Remote Code Execution Vulnerability2019-06-11

💬Community

1
Bugzilla
CVE-2019-13503 mongoose: heap-based buffer over-read in mq_parse_http in mongoose.c2019-07-11