Description
Microsoft Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, and Lync Basic 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office Graphics Library (OGL) font, aka "Microsoft Office Graphics Component Remote Code Execution Vulnerability."
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textdoswindows
https://www.exploit-db.com/exploits/37911
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-080
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1033238
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37911/
Scores
EPSS
0.6474
EPSS Percentile
98.5%
Details
CWE
CWE-20
Status
published
Products (4)
microsoft/live_meeting
2007
microsoft/lync
2010 (3 CPE variants)
microsoft/lync_basic
2013 sp1 (2 CPE variants)
microsoft/office
2010 sp2 (2 CPE variants)
Published
Aug 15, 2015
Tracked Since
Feb 18, 2026