CVE-2015-0097
Description
Microsoft Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Excel 2010 SP2, PowerPoint 2010 SP2, and Word 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Word Local Zone Remote Code Execution Vulnerability."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Crafted Office documents trigger remote code execution by referencing .wps as HTML in the Local Machine Zone, affecting Office 2007/2010.
Vulnerability
Microsoft Office 2007 SP3 (Excel, PowerPoint, Word) and Office 2010 SP2 (Excel, PowerPoint, Word) improperly handle specially crafted documents that reference a Works document (.wps) as HTML. When a user opens such a malicious file, the application processes the embedded HTML and script code in the context of the Local Machine Zone of Internet Explorer, bypassing security restrictions. This results in a remote code execution vulnerability, documented as CVE-2015-0097 and addressed by MS15-022 [1][2].
Exploitation
An attacker must deliver a crafted Office document (e.g., .doc, .rtf with a trailing space, or .wps) to a target and persuade the user to open it. No additional authentication or network position beyond user interaction is required. The exploit code demonstrates that by crafting a specially formed file, the Office application parses the reference as HTML and executes script within the Local Machine Zone [2].
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the current logged-on user. If the user has administrative rights, the attacker gains full control of the system, including the ability to install programs, view/change/delete data, and create new accounts with full user rights. The confidentiality, integrity, and availability of the affected system are all compromised [1][2].
Mitigation
Microsoft released security update MS15-022 (KB3038999) in March 2015, which corrects how Office parses specially crafted files and handles files in memory, thereby preventing the Local Machine Zone escalation. All users of the affected Office versions (2007 SP3 and 2010 SP2) should apply the update. No workarounds are documented for unpatched systems; upgrading to a supported version or applying the security update is the only recommended mitigation [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.