![]() ![]() Microsoft Office 2007 Service Pack 2 (Microsoft Word 2007 Service Pack 2) Microsoft Office 2003 Service Pack 3 (Microsoft Word 2003 Service Pack 3) ![]() An attacker could then install programs view, change, or delete data or create new accounts with full user rights.įollowing are links for downloading patches to fix the vulnerabilities: Microsoft Office 2008 for Mac, Microsoft Office for Mac 2011, Microsoft Office Compatibility Pack Service Pack 2 and Microsoft Office Compatibility Pack Service Pack 3.Īn attacker who successfully exploits this vulnerability could take complete control of an affected system. Microsoft Word 2003 Service Pack 3, Microsoft Word 2007 Service Pack 2, Microsoft Word 2007 Service Pack 3 System memory may be corrupted in such a way that an attacker could execute arbitrary code. Word is prone to an RTF Mismatch Vulnerability.Ī remote code execution vulnerability exists in the way that Microsoft Office software parses specially crafted RTF-formatted data. ![]() Microsoft Word is a proprietary word processing application written and distributed by Microsoft for Microsoft Windows and Mac OS X. Microsoft Word Remote Code Execution Vulnerability (MS12-029) Qualys has released the following checks for these new vulnerabilities: To fix newly discovered flaws in their software. Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition. Visit Qualys Security Blog to prioritize remediation. Their networks for these and other new vulnerabilities by accessing Vulnerability checks in the Qualys Cloud Platform to protectĪnnounced today by Microsoft. Qualys Vulnerability R&D Lab has released new ![]()
0 Comments
|