• United States



New Attack Targets Microsoft Word

Dec 06, 20062 mins
CSO and CISOData and Information Security

There’s now one more reason to be careful about opening Microsoft Office attachments.

Microsoft warned Tuesday of a new, unpatched memory corruption error in its word-processing software, and said that it was investigating reports of “limited” attacks that exploit the problem.

The bug can be exploited by adding a string of characters in a Word file that can corrupt the PC’s memory and allow the attacker to run unauthorized software on the system, Microsoft wrote in a security advisory. The bug affects many versions of the software, including Word 2000, 2002 and 2003, the Word Viewer 2003 and several versions of Microsoft Works. It is rated “critical” by the FrSIRT website, which compiles a list of software vulnerabilities.

As automatic security updates have become commonplace, attackers have focused more on developing attacks that leverage this kind of unpatched hole in the software, sometimes called 0day attacks. This trend has forced Microsoft to produce a growing number of software updates in recent months.

In particular, hackers turned their attention to Microsoft’s Office products, which some researchers consider to be a more fruitful source of bugs than the Windows operating system.

“Cybercriminals know that 0days are very valuable and can be used tomake lots of money,” said Cesar Cerrudo, chief executive officer ofsecurity research firm Argeniss, in Parana, Argentina. Thesevulnerabilities can be exploited to install spyware or dangerous Trojanhorse programs, or to add the victim’s computer to a network ofcompromised PCs, called a botnet, which can then be used to send outspam or attack other systems, he said.

Microsoft’s next set of security updates is due to be released on Dec. 12.By Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our Security Feed for updated news coverage.