A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user.
To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language.
The update address the vulnerability by modifying how the system handles objects in memory.
Metrics
Affected Vendors & Products
References
History
Tue, 20 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input, aka 'Microsoft Speech API Remote Code Execution Vulnerability'. | A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory. |
Title | Microsoft Speech API Remote Code Execution Vulnerability | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: microsoft
Published: 2019-06-12T13:49:38
Updated: 2025-05-20T17:49:58.557Z
Reserved: 2018-11-26T00:00:00
Link: CVE-2019-0985

No data.

Status : Modified
Published: 2019-06-12T14:29:02.133
Modified: 2025-05-20T18:15:33.073
Link: CVE-2019-0985

No data.