Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1474: PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without

0
High
VulnerabilityCVE-1999-1474cve-1999-1474
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: powerpoint

Description

PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:00:57 UTC

Technical Analysis

CVE-1999-1474 is a high-severity vulnerability affecting Microsoft PowerPoint versions 95 and 97. This vulnerability allows remote attackers to execute arbitrary applications automatically without user consent when a malicious PowerPoint document is opened, particularly when viewed through web browsers such as Internet Explorer. The issue arises from the way PowerPoint handles embedded objects or slide show content, enabling the automatic execution of external applications without prompting the user. This behavior can be exploited by attackers to run malicious code on the victim's system, potentially leading to full compromise. The vulnerability has a CVSS score of 7.5, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). No patches or official fixes are available, and there are no known exploits in the wild documented at this time. Given the age of the affected software, it is likely that these versions are no longer widely used in modern environments; however, legacy systems or archival environments may still be vulnerable. The vulnerability is particularly critical because it allows remote code execution without user interaction beyond opening the document, increasing the risk of automated or drive-by attacks via compromised websites or malicious email attachments.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of legacy systems running PowerPoint 95 or 97, which is uncommon in contemporary environments but may exist in archival, industrial, or specialized contexts. If exploited, attackers could execute arbitrary code remotely, leading to data breaches, system compromise, or disruption of business operations. Confidentiality could be severely impacted by unauthorized data access or exfiltration. Integrity could be compromised by unauthorized modification of data or system configurations. Availability could be affected if attackers deploy destructive payloads or ransomware. The automatic execution without user prompts increases the risk of successful exploitation through social engineering or drive-by downloads, especially in environments where Internet Explorer is still in use. European organizations with legacy document management systems or those relying on older Office suites are at higher risk. Additionally, sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited.

Mitigation Recommendations

Given the absence of official patches, European organizations should prioritize the following mitigations: 1) Identify and inventory any systems still running PowerPoint 95 or 97 and isolate them from internet-facing networks. 2) Migrate legacy documents to modern, supported Office formats and software versions to eliminate reliance on vulnerable software. 3) Disable or restrict the use of Internet Explorer for opening PowerPoint files, as the vulnerability is notably exploitable via IE. 4) Implement strict email filtering and attachment scanning to block or quarantine suspicious PowerPoint files, especially those originating from untrusted sources. 5) Employ application whitelisting to prevent unauthorized execution of applications triggered by PowerPoint files. 6) Educate users about the risks of opening legacy PowerPoint documents from unknown or untrusted sources. 7) Use endpoint detection and response (EDR) solutions to monitor for anomalous process executions that may indicate exploitation attempts. 8) Where legacy systems must be maintained, consider running them in isolated virtual environments with no network connectivity to limit exposure.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df69d

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/25/2025, 4:00:57 PM

Last updated: 2/4/2026, 11:51:37 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats