Security Advisor

Microsoft Fixes 19-Year-Old Windows and Office Flaw

Microsoft included the security solution in this month's Patch Tuesday release.

Among the 14 security bulletins Microsoft released on Tuesday (four items rated "critical") was a fix for a vulnerability that has been present in versions of Windows and Microsoft Office since 1995.

Bulletin MS14-064 looks to resolve two issues in Microsoft Windows Object Linking and Embedding (OLE).  If gone unpatched, a system could be left open to remote code execution attacks (RCE).

Discovered in May by IBM researchers, the flaw had been kept secret so both IBM and Microsoft could work on a fix. While the hole has been around for almost two decades, the threat from attackers leveraging it was slim, according to security experts.

In a blog post on Security Intelligence, IBM Research Manager Robert Freeman said that the vulnerability could only be remotely exploited through Internet Explorer 3.0 -- a version that has been replaced by numerous versions of the Internet browser.

"This complex vulnerability is a rare, 'unicorn-like' bug found in code that IE relies on but doesn't necessarily belong to," wrote Freeman. "The bug can be used by an attacker for drive-by attacks to reliably run code remotely and take over the user's machine -- even sidestepping the Enhanced Protected Mode (EPM) sandbox in IE 11 as well as the highly regarded Enhanced Mitigation Experience Toolkit (EMET) anti-exploitation tool Microsoft offers for free."

While there has been no evidence that the flaw has been in actual use by hackers over its long life, the fact that a hole like this has been present for so long brings up two troubling issues, according to Freeman. First, since the error took so long to pinpoint, the buggy code has been used countless times over the past 19 years by Microsoft, the flawed code has seeped into every single version of Microsoft's OS since 1995.

Second, if researchers just now discovered this flaw, how many more vulnerabilities could there be from yesteryear? Freeman said that the discovery of this flaw opens the door for hackers to try to discover any use-after-free and buffer overflows flaws. "These data manipulation vulnerabilities could lead to substantial exploitation scenarios from the manipulation of data values to remote code execution," wrote Freeman. "In fact, there may be multiple exploitation techniques that lead to possible remote code execution, as is the case with this particular bug."

Despite there not being any attacks using the flaw in the past, IT should make sure to apply this and all of the bulletins released this week as soon as possible. Now that the cat is out of the bag, look for attackers to start preying on those who take a lax attitude towards patching.

About the Author

Chris Paoli is the site producer for and


  • Basic Authentication Extended to 2H 2021 for Exchange Online Users

    Microsoft is now planning to disable Basic Authentication use with its Exchange Online service sometime in the "second half of 2021," according to a Friday announcement.

  • Microsoft Offers Endpoint Configuration Manager Advice for Keeping Remote Clients Patched

    Microsoft this week offered advice for organizations using Microsoft Endpoint Configuration Manager with remote Windows systems that need to get patched, and it also announced Update 2002.

  • Azure Edge Zones Hit Preview

    Azure Edge Zones, a new edge computing technology from Microsoft designed to enable new scenarios for developers and partners, emerged as a preview release this week.

  • Microsoft Shifts 2020 Events To Be Online Only

    Microsoft is shifting its big events this year to be online only, including Ignite 2020.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.