A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0985 | vendor advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0985 | patch vendor advisory |