CWE
Advisory Published
Updated

CVE-2007-0515

First published: Fri Jan 26 2007(Updated: )

Unspecified vulnerability in Microsoft Word allows user-assisted remote attackers to execute arbitrary code on Word 2000, and cause a denial of service on Word 2003, via unknown attack vectors that trigger memory corruption, as exploited by Trojan.Mdropper.W and later by Trojan.Mdropper.X, a different issue than CVE-2006-6456, CVE-2006-5994, and CVE-2006-6561.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Microsoft Works Suite=2006
Microsoft Office=2004
Microsoft Office Word=2000
Microsoft Office=xp-sp3
Microsoft Office=2003-sp2
Microsoft Office Word=2003
Microsoft Works Suite=2005
Microsoft Office Word=2002
Microsoft Office Word Viewer=2003
Microsoft Works Suite=2004
Microsoft Office=2000-sp3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2007-0515?

    CVE-2007-0515 has been rated as critical due to its potential for remote code execution and denial of service.

  • How do I fix CVE-2007-0515?

    To mitigate CVE-2007-0515, it is recommended to update Microsoft Word and related software to the latest versions available.

  • What platforms are affected by CVE-2007-0515?

    CVE-2007-0515 affects various versions of Microsoft Word, Microsoft Office, and Microsoft Works, including Word 2000 through 2003.

  • What types of attacks exploit CVE-2007-0515?

    CVE-2007-0515 can be exploited through user-assisted attacks involving specially crafted documents that trigger memory corruption.

  • What are the symptoms of exploitation of CVE-2007-0515?

    Exploitation of CVE-2007-0515 may result in arbitrary code execution on the affected system or cause the application to crash.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203