Unrated severityNVD Advisory· Published Jun 12, 2019· Updated May 20, 2025
Microsoft Speech API Remote Code Execution Vulnerability
CVE-2019-0985
Description
A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory.
Affected products
5- Range: 6.1.0
- Range: 6.1.7601.0
- Microsoft/Windows Server 2008 R2 Service Pack 1 (Server Core installation)v5Range: 6.1.7601.0
- Microsoft/Windows Server 2008 R2 Systems Service Pack 1v5Range: 6.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0985mitrevendor-advisory
News mentions
0No linked articles in our index yet.