CVE-1999-1474: PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without
PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer.
AI Analysis
Technical Summary
CVE-1999-1474 is a high-severity vulnerability affecting Microsoft PowerPoint versions 95 and 97. This vulnerability allows remote attackers to execute arbitrary applications automatically without user consent when a malicious PowerPoint document is opened, particularly when viewed through web browsers such as Internet Explorer. The issue arises from the way PowerPoint handles embedded objects or slide show content, enabling the automatic execution of external applications without prompting the user. This behavior can be exploited by attackers to run malicious code on the victim's system, potentially leading to full compromise. The vulnerability has a CVSS score of 7.5, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). No patches or official fixes are available, and there are no known exploits in the wild documented at this time. Given the age of the affected software, it is likely that these versions are no longer widely used in modern environments; however, legacy systems or archival environments may still be vulnerable. The vulnerability is particularly critical because it allows remote code execution without user interaction beyond opening the document, increasing the risk of automated or drive-by attacks via compromised websites or malicious email attachments.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the presence of legacy systems running PowerPoint 95 or 97, which is uncommon in contemporary environments but may exist in archival, industrial, or specialized contexts. If exploited, attackers could execute arbitrary code remotely, leading to data breaches, system compromise, or disruption of business operations. Confidentiality could be severely impacted by unauthorized data access or exfiltration. Integrity could be compromised by unauthorized modification of data or system configurations. Availability could be affected if attackers deploy destructive payloads or ransomware. The automatic execution without user prompts increases the risk of successful exploitation through social engineering or drive-by downloads, especially in environments where Internet Explorer is still in use. European organizations with legacy document management systems or those relying on older Office suites are at higher risk. Additionally, sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize the following mitigations: 1) Identify and inventory any systems still running PowerPoint 95 or 97 and isolate them from internet-facing networks. 2) Migrate legacy documents to modern, supported Office formats and software versions to eliminate reliance on vulnerable software. 3) Disable or restrict the use of Internet Explorer for opening PowerPoint files, as the vulnerability is notably exploitable via IE. 4) Implement strict email filtering and attachment scanning to block or quarantine suspicious PowerPoint files, especially those originating from untrusted sources. 5) Employ application whitelisting to prevent unauthorized execution of applications triggered by PowerPoint files. 6) Educate users about the risks of opening legacy PowerPoint documents from unknown or untrusted sources. 7) Use endpoint detection and response (EDR) solutions to monitor for anomalous process executions that may indicate exploitation attempts. 8) Where legacy systems must be maintained, consider running them in isolated virtual environments with no network connectivity to limit exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-1474: PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without
Description
PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer.
AI-Powered Analysis
Technical Analysis
CVE-1999-1474 is a high-severity vulnerability affecting Microsoft PowerPoint versions 95 and 97. This vulnerability allows remote attackers to execute arbitrary applications automatically without user consent when a malicious PowerPoint document is opened, particularly when viewed through web browsers such as Internet Explorer. The issue arises from the way PowerPoint handles embedded objects or slide show content, enabling the automatic execution of external applications without prompting the user. This behavior can be exploited by attackers to run malicious code on the victim's system, potentially leading to full compromise. The vulnerability has a CVSS score of 7.5, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). No patches or official fixes are available, and there are no known exploits in the wild documented at this time. Given the age of the affected software, it is likely that these versions are no longer widely used in modern environments; however, legacy systems or archival environments may still be vulnerable. The vulnerability is particularly critical because it allows remote code execution without user interaction beyond opening the document, increasing the risk of automated or drive-by attacks via compromised websites or malicious email attachments.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the presence of legacy systems running PowerPoint 95 or 97, which is uncommon in contemporary environments but may exist in archival, industrial, or specialized contexts. If exploited, attackers could execute arbitrary code remotely, leading to data breaches, system compromise, or disruption of business operations. Confidentiality could be severely impacted by unauthorized data access or exfiltration. Integrity could be compromised by unauthorized modification of data or system configurations. Availability could be affected if attackers deploy destructive payloads or ransomware. The automatic execution without user prompts increases the risk of successful exploitation through social engineering or drive-by downloads, especially in environments where Internet Explorer is still in use. European organizations with legacy document management systems or those relying on older Office suites are at higher risk. Additionally, sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize the following mitigations: 1) Identify and inventory any systems still running PowerPoint 95 or 97 and isolate them from internet-facing networks. 2) Migrate legacy documents to modern, supported Office formats and software versions to eliminate reliance on vulnerable software. 3) Disable or restrict the use of Internet Explorer for opening PowerPoint files, as the vulnerability is notably exploitable via IE. 4) Implement strict email filtering and attachment scanning to block or quarantine suspicious PowerPoint files, especially those originating from untrusted sources. 5) Employ application whitelisting to prevent unauthorized execution of applications triggered by PowerPoint files. 6) Educate users about the risks of opening legacy PowerPoint documents from unknown or untrusted sources. 7) Use endpoint detection and response (EDR) solutions to monitor for anomalous process executions that may indicate exploitation attempts. 8) Where legacy systems must be maintained, consider running them in isolated virtual environments with no network connectivity to limit exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df69d
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/25/2025, 4:00:57 PM
Last updated: 8/17/2025, 1:58:41 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-53705: CWE-787 Out-of-bounds Write in Ashlar-Vellum Cobalt
HighCVE-2025-41392: CWE-125 Out-of-bounds Read in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.