Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2019-0985: Microsoft Speech API Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2019-0985: Microsoft Speech API Remote Code Execution Vulnerability

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
06/11/2019
Created
06/12/2019
Added
06/11/2019
Modified
06/17/2019

Description

A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory.

Solution(s)

  • msft-kb4503269-1cdbe639-c27c-4ac7-9343-f9bf1604f686
  • msft-kb4503269-2ab80a73-82cd-43ce-a721-9bdf2efe53cb
  • msft-kb4503269-358b582d-4bc3-413a-8b92-8bcf4353a820
  • msft-kb4503269-3c4860d8-79ae-4d88-b2ea-5514f6cff025
  • msft-kb4503269-48d42c58-c168-47e3-b5b9-fa8b78b0ae33
  • msft-kb4503269-af9ce13b-08ae-4959-9ba1-cbfb91fb4189

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;