VYPR
Unrated severityNVD Advisory· Published Apr 14, 2015· Updated May 6, 2026

CVE-2015-1651

CVE-2015-1651

Description

Use-after-free vulnerability in Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allows remote code execution via crafted Office document.

Vulnerability

A use-after-free vulnerability exists in Microsoft Word 2007 Service Pack 3 (SP3), Microsoft Word Viewer, and the Microsoft Office Compatibility Pack Service Pack 3 (SP3). The flaw occurs when the affected software parses a specially crafted Office document, leading to improper memory handling. An attacker can trigger the vulnerability by convincing a user to open a malicious file. This issue is addressed in Microsoft Security Bulletin MS15-033 [1].

Exploitation

Exploitation requires an attacker to deliver a crafted Office document to a target user, typically via email or a malicious website. No additional privileges or user interaction beyond opening the file are needed. The attacker does not need authenticated access; the user must simply open the document with the vulnerable software. The use-after-free condition is triggered during parsing, allowing the attacker to control program flow [1].

Impact

Successful exploitation grants the attacker arbitrary code execution in the context of the current user. If the user has administrative rights, the attacker can gain full control of the system, including installing programs, viewing or modifying data, and creating new accounts. The impact is limited to the user's privilege level, but the vulnerability is rated Critical due to the potential for remote code execution without authentication [1].

Mitigation

Microsoft released security update MS15-033 on April 14, 2015, which addresses this vulnerability by correcting how Office parses specially crafted files and handles memory. Users should apply the update for affected software: Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3. No workarounds are provided in the bulletin. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

6
  • cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*
    • (no CPE)range: SP3
  • cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*
    • (no CPE)
  • Range: SP3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.