First published: Wed Apr 12 2017(Updated: )
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office and WordPad | ||
Microsoft Office | =2007-sp3 | |
Microsoft Office | =2010-sp2 | |
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2016 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Vista | =sp2 | |
Philips IntelliSpace Portal | =7.0 | |
Philips IntelliSpace Portal | =8.0 | |
Microsoft Office | =2016 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0199 has a critical severity rating due to its ability to allow remote code execution through specially crafted documents.
To fix CVE-2017-0199, users should apply the latest security updates provided by Microsoft for the affected versions of Office and Windows.
CVE-2017-0199 affects multiple versions of Microsoft Office, including Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016, along with various Windows operating systems.
CVE-2017-0199 exploits vulnerabilities in Microsoft Office and WordPad to execute arbitrary code via crafted documents, allowing remote attackers to gain control.
While the best solution is to apply patches, users can mitigate the risk of CVE-2017-0199 by avoiding opening untrusted documents or enabling Protected View in Office.