![]() ![]() For an attack to be successful a user must open an attachment that is sent in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. This security update resolves a privately reported vulnerability in COM validation in Microsoft Office. Version: 1.1 General Information Executive Summary Security Bulletin Microsoft Security Bulletin MS10-036 - Important Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution (983235)
0 Comments
Leave a Reply. |