Microsoft Word, Outlook vulnerabilities identified

Vulnerabilities have been identified in two widely-used Microsoft Corp. products, Microsoft Word and Outlook Express.

In Microsoft Word's case, an attacker could steal data from a victim's hard disk, according to alerts posted on the Bugtraq Web site weeks ago and acknowledged by Microsoft on Friday.

It would work like this: The attacker creates a Word 97 document and embeds hidden fields, such as the "IncludeText" field, in it. The attacker then e-mails the malicious document to the intended victim. When the victim opens the document, the fields retrieve data from the hard disk. The attacker would then receive the stolen data in the document when the victim e-mails it back to him.

In order to exploit this vulnerability, an attacker would have to know the names and the locations of the victim's files containing the information he wanted to steal. The hidden fields would look for data in specific files, and not do a general scan of the hard disk. Because of this complexity, Microsoft and most security experts qualified their warnings concerning the vulnerability by noting that the potential threat of being attacked using fields is limited.

"We believe there are some important mitigating factors," said Lynn Terwoerds, Security Program Manager at Microsoft, referring to the difficulty of exploiting the vulnerability. "A successful attack, in which several best practices and mitigating factors are not applied, could potentially allow a malicious user to view the contents of a targeted file."

A long-standing feature of Microsoft Word, fields allow users to create documents with information that can be automatically updated or changed without requiring action by the author, such as dates and page numbers.

Fields can easily be hidden in documents -- buried in the header or footer region and formatted with invisible text, for example. Once hidden in the body of a document, security experts warn, fields can easily and silently access text and graphics on a user's hard drive. The vulnerability was shown to exist in Microsoft Word 97, but could not be duplicated in Word 2000 or Word 2002, according to statements posted on the Bugtraq Web page.

And even with the seeming difficulty of exploiting the vulnerability, some security experts warn, the widespread use of Microsoft Word increases the likelihood of successful attacks.

"The fact that you have all these organizations using Microsoft Office products as their main communications tools, and the fact that you have (files) in standard predictable places with standard predictable names puts those things at risk," said Sean Smith, Assistant Professor of Computer Science at Dartmouth College, who has studied the use of fields in Word documents to construct attacks.

Microsoft's popular Outlook Express e-mail program was named in another advisory issued Thursday by Beyond Security Ltd., a computer security consulting company based in Israel.

By taking advantage of a standard Outlook Express feature that enables users to automatically break up large outgoing e-mails into two or more smaller files, technicians at Beyond Security were able to sneak viruses past many common Simple Mail Transport Protocol (SMTP) content filtering engines, which organizations use to weed out viruses and other attacks from incoming e-mail.

The problem lies not with Microsoft's e-mail program, experts say, so much as with the filtering engines from third parties that failed to detect the ruse.

"Outlook Express is the only program that's doing stuff right. This is a documented feature," said Aviram Jenik, CEO of Beyond Security, citing the Internet Engineering Task Force (IETF) standards documentation that calls for such fragmenting of e-mail messages. "(SMTP filtering) products are supposed to be able to filter these messages."

Many popular filtering programs did not, however. Among the products that released patches to eliminate the vulnerability was Trend Micro Inc.'s InterScan VirusWall. The vulnerability of many other e-mail scanning programs to SMTP fragmenting was not clear.

Trend Micro could not be reached for comment.

Some products, including Symantec Corp.'s Norton AntiVirus for Gateways were not affected because their software already blocked or contained options that allow administrators to block multipart e-mail messages.

"This is a default option (of Norton AntiVirus) and has been (in the product) for a significant amount of time," said Vincent Weafer, Senior Director of Symantec Security Response at Cupertino, California-based Symantec.

But that approach may have its own limitations when it is used as the sole means of preventing attacks, experts warn.

"That's a (solution) that's just crying out for another vulnerability to surface," said Jenik. "These programs should assemble the message and check its content before rejecting it."

Besides, Jenik added, e-mail fragmenting has its place, even in a world where more and more people enjoy high bandwidth Internet connections.

"We've all probably had e-mails rejected by a server because they were too large. I've personally had to manually fragment messages into smaller chunks, so if Outlook does it for me, great."

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?