First published: Tue Jan 08 2019(Updated: )
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft SharePoint, Microsoft Office Online Server, Microsoft Word, Microsoft SharePoint Server.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2010-sp2 | |
Microsoft Office for Mac OS X | =2016 | |
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office 365 | ||
Microsoft Office Online Server | ||
Microsoft Office Web Apps Server 2013 | =2010-sp2 | |
Microsoft Word Viewer | ||
Microsoft SharePoint Server 2010 | =2013-sp1 | |
Microsoft SharePoint Server 2010 | =2016 | |
Microsoft SharePoint Server 2010 | =2019 | |
Microsoft Office Word | =2010-sp2 | |
Microsoft Office Word | =2013-sp1 | |
Microsoft Office Word | =2013-sp1 | |
Microsoft Office Word | =2016 | |
Microsoft Word Automation Services |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0585 is a remote code execution vulnerability in Microsoft Word software.
CVE-2019-0585 has a severity level of critical.
Microsoft Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft SharePoint, and others are affected by CVE-2019-0585.
CVE-2019-0585 exploits the vulnerability by failing to properly handle objects in memory.
You can find more information about CVE-2019-0585 at the following references: [http://www.securityfocus.com/bid/106392](http://www.securityfocus.com/bid/106392), [https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0585](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0585).