|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Microsoft Office: use after free
Synthesis of the vulnerability
An attacker can force the usage of a freed memory area of Microsoft Office, in order to trigger a denial of service, and possibly to execute code.
Impacted software: Office, Excel, InfoPath, OneNote, Outlook, PowerPoint, Project, Publisher, Visio, Word.
Severity of this computer vulnerability: 3/4.
Consequences of a hack: user access/rights, denial of service on client.
Attacker's origin: document.
Creation date: 09/12/2014.
Références of this announce: 3017349, CERTFR-2014-AVI-520, CVE-2014-6364, MS14-082, VIGILANCE-VUL-15766.
Description of the vulnerability
The Microsoft Office suite converts documents to object located in memory.
However, a function frees a memory area before reusing it.
An attacker can therefore force the usage of a freed memory area of Microsoft Office, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a network vulnerability note. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system.