First published: Thu Dec 11 2014(Updated: )
Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2010-sp2 | |
Microsoft Office | =2010-sp2 | |
Microsoft Office for Mac | =2011 | |
Microsoft Office | =2013 | |
Microsoft Office | =2013 | |
Microsoft Office | =2013 | |
Microsoft Office | =2013-sp1 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =sp3 | |
Microsoft SharePoint Server | =2010-sp2 | |
Microsoft SharePoint Server | =2013 | |
Microsoft SharePoint Server | =2013-sp1 | |
Microsoft Web Applications | =2010-sp2 | |
Microsoft Web Applications | =2013 | |
Microsoft Web Applications | =2013-sp1 | |
Microsoft Word Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6357 has a critical severity level that allows remote attackers to execute arbitrary code.
To fix CVE-2014-6357, you should apply the appropriate security updates provided by Microsoft for the affected Office versions.
CVE-2014-6357 affects Microsoft Office 2010 SP2, Office 2013 versions, Office for Mac 2011, and several SharePoint and web application versions.
A use-after-free vulnerability, such as CVE-2014-6357, occurs when a program continues to use memory after it has been freed, potentially leading to memory corruption and arbitrary code execution.
Yes, exploit code for CVE-2014-6357 has been publicly released, increasing the urgency for applying security patches.