Microsoft Works vulnerability could allow remote code execution
Report ID: MS201210002
Date Published: 10 October 2012
Compromise Type: remote-code-execution
Compromise From: remote
Microsoft Works 9
A vulnerability in Microsoft Works could allow an attacker to execute arbitrary code and take control of an affected system.
Microsoft has released a security update to address a vulnerability in Microsoft Works. The vulnerability was caused by memory corruption which resulted from parsing a specially crafted Word file. An attacker could take advantage of the condition to execute arbitrary code and take control of an affected system.
This vulnerability has been resolved through the latest update, which introduces a modification in the way that Word files are parsed. Users are recommended to install this update to protect their system from potential exploit attempts.
Install the latest security patch for applicable system, available for download from (http://technet.microsoft.com/en-us/security/bulletin/ms12-065)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.