{"id":48979,"date":"2016-04-14T14:45:11","date_gmt":"2016-04-14T21:45:11","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48979"},"modified":"2025-05-29T03:11:58","modified_gmt":"2025-05-29T10:11:58","slug":"cve-2016-0153-microsoft-patches-possible-ole-typo","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/","title":{"rendered":"CVE-2016-0153: Microsoft Patches Possible OLE Typo"},"content":{"rendered":"<p>Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we can discuss this vulnerability, which resides in the OleRegEnumVerbs() function of ole32.dll.<\/p>\n<p>During our research we found that a stack corruption vulnerability in ole32!OleRegEnumVerbs can be triggered if we embed any OLE1 object into an Office document and try to load it. Whether a class identifier (CLSID) represents an OLE1 class can be determined from the registry.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48986 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png\" alt=\"20160414 OLE typo 1\" width=\"693\" height=\"258\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-1.png 693w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-1-300x112.png 300w\" sizes=\"auto, (max-width: 693px) 100vw, 693px\" \/><\/p>\n<p>As we see in the registry editor, HKEY_CLASSES_ROOT\\CLSID\\{00030000-0000-0000-C000-000000000046} represents an OLE1 object. Hence this CLSID can be used to trigger the bug.<\/p>\n<p>This CLSID was embedded in a Word document. We observed the app crash when an attempt was made to load that OLE object. The stack trace on Windows 8.1 appeared like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48985 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-2.png\" alt=\"20160414 OLE typo 2\" width=\"919\" height=\"714\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-2.png 919w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-2-300x233.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-2-768x597.png 768w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\" \/><\/p>\n<p>Using windbg we can see the crash occurred inside the OleRegEnumVerbs() function with the exception code STATUS_STACK_BUFFER_OVERRUN. From this exception code, we can tell this is a stack corruption.<\/p>\n<p>To find the root cause, we took a look at the disassembly of OleRegEnumVerb(). The first thing we see is a call to the CoIsOle1Class() function and the CLSID being passed to it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48984 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-3.png\" alt=\"20160414 OLE typo 3\" width=\"590\" height=\"258\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-3.png 590w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-3-300x131.png 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/p>\n<p>According to the Microsoft Developer Network, the CoIsOle1Class() function verifies whether the CLSID passed to it represents an OLE1 object. In this case the CSID we feed into this function does represent an OLE1 object, so the program reaches the following code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48983 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-4.png\" alt=\"20160414 OLE typo 4\" width=\"1034\" height=\"455\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-4.png 1034w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-4-300x132.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-4-768x338.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-4-1024x451.png 1024w\" sizes=\"auto, (max-width: 1034px) 100vw, 1034px\" \/><\/p>\n<p>Here we see two calls: ProgIDFromCLSID() and StringCchCopyExW(). In this scenario we are interested in the StringCchCopyExW() call. The developer network tell us the StringCchCopyExW() function basically copies one string to another.<\/p>\n<p style=\"padding-left: 30px;\">Ret_value = StringCchCopyExW(szKey, 0x100u, psz, &amp;pwszBase, &amp;cchRemain, 0);<\/p>\n<p>In the preceding call:<\/p>\n<p style=\"padding-left: 30px;\">szKey is the destination buffer<\/p>\n<p style=\"padding-left: 30px;\">0x100 is the size of the destination buffer<\/p>\n<p style=\"padding-left: 30px;\">psz is the source string (RegionUsageHeap)<\/p>\n<p style=\"padding-left: 30px;\">pwszBase is the address of a pointer to the end of szKey<\/p>\n<p style=\"padding-left: 30px;\">cchRemain is the number of unused characters in szKey<\/p>\n<p>After this call succeeds, the program reaches following code, which is where the bug lies:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48982 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-5.png\" alt=\"20160414 OLE typo 5\" width=\"687\" height=\"237\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-5.png 687w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-5-300x103.png 300w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/p>\n<p>As we see, the code subtracts psz from pwszBase. Here pwszBase belongs to the stack, and psz belongs to the heap. Thus the value of pwszBase will less than psz, and the subtraction result (saved into ebx) becomes negative. At runtime, we can see value of ebx becomes 0xf9d93e2c, which points to kernel land.<\/p>\n<p style=\"padding-left: 30px;\">0:000&gt;? 0x002d9844 &#8211; 0x06545a18<\/p>\n<p style=\"padding-left: 30px;\">Evaluate expression: -103203284 = 0xf9d93e2c<\/p>\n<p>This bug occurs most likely because the developer made a typo. The developer\u2019s intention probably was ebx = pwszBase \u2013 szKey, instead of ebx = pwszBase \u2013 psz.<\/p>\n<p>Later we see another call to OpenClassesRootKeyExW().If the call is successful, the program tries dereference the corrupted pointer in the stack and write 0x00 there. Thus we see the host application crash.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48981 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-6.png\" alt=\"20160414 OLE typo 6\" width=\"951\" height=\"776\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-6.png 951w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-6-300x245.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-6-768x627.png 768w\" sizes=\"auto, (max-width: 951px) 100vw, 951px\" \/><\/p>\n<p>Under certain circumstance, when the exploit attempt is combined with other vulnerabilities, this flaw can lead to remote code execution.<\/p>\n<h2><strong>Vulnerability disclosure timeline<\/strong><\/h2>\n<ul>\n<li>January 16: McAfee labs reports issue to Microsoft Security Response Center<\/li>\n<li>February 1: MSRC confirms issue.<\/li>\n<li>April 12: Microsoft releases patch as part of MS16-044.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452,338],"coauthors":[3973],"class_list":["post-48979","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity","tag-endpoint-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2016-0153: Microsoft Patches Possible OLE Typo | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2016-0153: Microsoft Patches Possible OLE Typo | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-14T21:45:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T10:11:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"258\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"CVE-2016-0153: Microsoft Patches Possible OLE Typo\",\"datePublished\":\"2016-04-14T21:45:11+00:00\",\"dateModified\":\"2025-05-29T10:11:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png\",\"keywords\":[\"computer security\",\"cybersecurity\",\"endpoint protection\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/\",\"name\":\"CVE-2016-0153: Microsoft Patches Possible OLE Typo | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png\",\"datePublished\":\"2016-04-14T21:45:11+00:00\",\"dateModified\":\"2025-05-29T10:11:58+00:00\",\"description\":\"Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CVE-2016-0153: Microsoft Patches Possible OLE Typo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2016-0153: Microsoft Patches Possible OLE Typo | McAfee Blog","description":"Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"CVE-2016-0153: Microsoft Patches Possible OLE Typo | McAfee Blog","og_description":"Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-04-14T21:45:11+00:00","article_modified_time":"2025-05-29T10:11:58+00:00","og_image":[{"width":693,"height":258,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160414-OLE-typo-1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"CVE-2016-0153: Microsoft Patches Possible OLE Typo","datePublished":"2016-04-14T21:45:11+00:00","dateModified":"2025-05-29T10:11:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/"},"wordCount":535,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png","keywords":["computer security","cybersecurity","endpoint protection"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/","name":"CVE-2016-0153: Microsoft Patches Possible OLE Typo | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png","datePublished":"2016-04-14T21:45:11+00:00","dateModified":"2025-05-29T10:11:58+00:00","description":"Recently McAfee Labs discovered an interesting bug in Windows\u2019 OLE implementation, which Microsoft patched this week. Now that the patch is available, we","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160414-OLE-typo-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2016-0153-microsoft-patches-possible-ole-typo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"CVE-2016-0153: Microsoft Patches Possible OLE Typo"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48979"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48979\/revisions"}],"predecessor-version":[{"id":214699,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48979\/revisions\/214699"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48979"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}