The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer weakness bulletin CVE-2014-1817 CVE-2014-1818

Windows, Office, Lync: multiple vulnerabilities of Graphic

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Graphic of Windows, Office and Lync.
Severity of this bulletin: 4/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/06/2014.
Références of this threat: 2967487, CERTFR-2014-AVI-267, CVE-2014-1817, CVE-2014-1818, MS14-036, VIGILANCE-VUL-14877.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Windows, Office and Lync.

An attacker can generate a memory corruption in Unicode Script Processor (usp10.dll), in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2014-1817]

An attacker can generate a memory corruption in GDI+, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2014-1818]
Full Vigil@nce bulletin... (Free trial)

This computer threat announce impacts software or systems such as Lync, Office, Access, Office Communicator, Excel, OneNote, Outlook, PowerPoint, Project, Publisher, Visio, Word, Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.

Our Vigil@nce team determined that the severity of this computer vulnerability is critical.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this cybersecurity alert.

Solutions for this threat

Windows, Office, Lync: patch for Graphic.
A patch is available in information sources.
The Microsoft announce indicates a workaround.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides network vulnerability patches. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system.