Check Point Advisories

Microsoft Word Memory Corruption (MS14-061; CVE-2014-4117)

Check Point Reference: CPAI-2014-1884
Date Published: 14 Oct 2014
Severity: High
Last Updated: Tuesday 14 October, 2014
Source: Microsoft Security Bulletin MS14-061
Industry Reference:CVE-2014-4117
Protection Provided by:

Security Gateway
R77

  • R76
  • R75
  • R71
  • R70

  • Who is Vulnerable? Microsoft Office 2007
    Microsoft Office 2010
    Microsoft Office for Mac 2011
    Microsoft Office Compatibility Pack Service Pack 3
    Microsoft Word Viewer
    Microsoft SharePoint Server 2010
    Microsoft Word Web Apps 2010
    Vulnerability Description A remote code execution vulnerability has been reported in Microsoft Word. The vulnerability is caused when Microsoft Word does not properly handle objects in memory while parsing specially crafted Office files. A remote attacker can exploit this issue by enticing a user to open a specially crafted document with an affected version of Microsoft Word.
    Update/Patch AvaliableApply patches from: MS14-061

    Protection Overview

    Security Gateway R77 / R76 / R75 / R71 / R70

    1. In the IPS tab, click Protections and find the Microsoft Word Memory Corruption (MS14-061: CVE-2014-4117) protection using the Search tool and Edit the protection's settings.
    2. Install policy on all modules.

    SmartView Tracker will log the following entries:

    Attack Name: Content Protection Violation.
    Attack Information: Microsoft Word Memory Corruption (MS14-061: CVE-2014-4117)

    ×
      Feedback
    This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
    OK