A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user.
To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language.
The update address the vulnerability by modifying how the system handles objects in memory.
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0985 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0985 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory. | |
References |
|
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0985 - Patch, Vendor Advisory |
Information
Published : 2019-06-12 14:29
Updated : 2025-05-20 18:15
NVD link : CVE-2019-0985
Mitre link : CVE-2019-0985
CVE.ORG link : CVE-2019-0985
JSON object : View
Products Affected
microsoft
- windows_7
- windows_server_2008
CWE
CWE-787
Out-of-bounds Write