facebook rss twitter

New vulnerability puts MS Word and Works users at risk

by Bob Crabtree on 7 December 2006, 12:18

Tags: Microsoft (NASDAQ:MSFT)

Quick Link: HEXUS.net/qahhm

Add to My Vault: x


Pirate skull

Take extra care when opening MS Word documents arriving by email or found on web sites. Microsoft has issued a new Security Advisory - number 929433 - warning that opening a 'specially crafted' Word document containing a 'malformed string' could give the document's author the same user rights that you have.

The company points out (though not quite in those words) that users whose accounts are configured to have administrative user rights could be worse affected than those working with fewer user rights.

Until Microsoft comes up a security update that addresses this vulnerability - and there's no clue yet when that will be - it's warning the public not to open or save Word files that come from un-trusted sources or arrive unexpectedly from trusted sources. Eeek!

The problem affects Works 2004, 2005 and 2006, not just Word.

And a good few generations of Word for Windows and Mac are affected - Word 2000, 2002, 2003, Word Viewer 2003, Word 2004 for Mac and Word 2004 v. X for Mac.

Microsoft issues this kinds of warning even when the risk is slight - to cover its behind and to be seen to be trying to deal with issues that arise from weaknesses or features in the original coding of programs and operating systems.

It's also the case that good anti-virus software is likely to spot malicious code in programs such as Word or, if nothing more, warn users about macros and other automated events.

Microsoft itself has a little applet - The Office Document Open Confirmation Tool - that Word 2000 users can install to prevents the automatic opening of documents from within Internet Explorer - or, at least warn, that this is going to happen and allow you to stop it happening.

Ideas why any f*ckwit might feel justified in creating a 'specially crafted' MS Word document? Find out more about the problem by reading the full Microsoft Security Advisory (929433), then feel free to comment in this thread in the HEXUS.lifestyle.news forum.

HEXUS.links

HEXUS.community :: discussion thread about this article
HEXUS.lifestyle.headlines :: Microsoft targets Sony DRM and other rootkit malware

External.links

Microsoft - Security Advisory (929433)
Microsoft - The Office Document Open Confirmation Tool


HEXUS Forums :: 3 Comments

Login with Forum Account

Don't have an account? Register today!
Personally I'd be more concerned with the Acrobat 7 vulnerability which again could allow arbitary code excecution :)

http://www.adobe.com/support/security/bulletins/apsb06-20.html
Thanks for the heads-up!

However, unlike the MS vulnerability, this one, seemingly, does have a fix now.

I suspect this will be automatically implemented if you've got Acrobat 7 set to report auto updates.

Trouble is, Adobe updates seem to arrive at such regular intervals that I've slipped into the bad habit of ignoring them!

Those who don't have auto-update enabled, should, of course, dive over here and sort things out.
Deleted
Trouble is, Adobe updates seem to arrive at such regular intervals that I've slipped into the bad habit of ignoring them!
At first Adobe updates seemed to arrive at completely arbitrary intervals, but I soon realised that they were timed to annoy me at an exponential rate.

Some days… BAM “you need to update, and reboot… eight times, thanks!”

I exaggerate, but you get the picture.

Oh, and I use OO.org most of the time, so much for Word vulns :D