Vulnerability Description
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Office | 2011 |
| Microsoft | Office Compatibility Pack | - |
| Microsoft | Office Web Apps | 2010 |
| Microsoft | Office Web Apps Server | 2013 |
| Microsoft | Sharepoint Server | 2010 |
| Microsoft | Word | 2003 |
| Microsoft | Word Viewer | - |
Related Weaknesses (CWE)
References
- http://technet.microsoft.com/security/advisory/2953095PatchVendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-01PatchVendor Advisory
- http://technet.microsoft.com/security/advisory/2953095PatchVendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-01PatchVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-US Government Resource
FAQ
What is CVE-2014-1761?
CVE-2014-1761 is a vulnerability with a CVSS score of 7.8 (HIGH). Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 ...
How severe is CVE-2014-1761?
CVE-2014-1761 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1761?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Office, Microsoft Office Compatibility Pack, Microsoft Office Web Apps, Microsoft Office Web Apps Server, Microsoft Sharepoint Server.