Third Word exploit released

Hackers have published attack code exploiting an the third Microsoft Word flaw to reported in the past week

Hackers have released attack code that exploits a critical vulnerability in Microsoft's Word software -- the third such bug to be disclosed in the past week.

The proof of concept code was posted Tuesday on the Milw0rm.com Web site, making it widely available to the hacking community. It exploits a previously unreported bug in Word.

Like the other recent Word bugs disclosed this past week, it could be used by attackers to run unauthorized software on a victim's computer, said David Marcus, security research and communications manager with McAfee's Avert Labs

Attackers have been using these Word exploits in extremely targeted attacks, where a small number of victims are sent an e-mail with a maliciously encoded Word document attached. The hackers use social engineering techniques to try to trick the victim into opening the dangerous attachment.

For example, in a recent Word attack, first reported Sunday, the malicious e-mail "was sent to a very high-profile company, directly to three people at the company," Marcus said.

Microsoft is investigating reports of this latest Word bug, a spokesman for the company's public relations agency said.

Though they are not being widely exploited, the unpatched Word vulnerabilities are causing some enterprises concern.

At the Port of Seattle, for example, users are being cautioned and e-mail with Word attachments is getting a little more scrutiny, said Ernie Hayden, chief information security manager with the port. "We've done some blocking on our e-mail, and we've had dialogue with people with respect to what our expectations are," he said.

Attacks on Microsoft's Office software have been on the rise for months now, said Marc Maiffret, chief technology officer with security vendor eEye Digital Security Inc. Office vulnerabilities were once released "on a monthly basis," he said. "Now we're at the point were it's almost daily."

Still, publishing attack code ultimately works contrary to the interests of the bad guys, he added. "It's kind of disruptive, and it creates a panic," he said. "But all it does is make the industry focus and come up with a resolution."

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert McMillan

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?