Americas

  • United States

Asia

Oceania

roger_grimes
Columnist

Zero day MS-Word exploit in the Wild

Analysis
May 19, 20061 min
Data and Information SecuritySecurity

This is rated low-risk everywhere and it's not widespread -- still folks should be careful with suspicious Word documents. MDropper Trojan - Exploits Zero Day vulnerability in MS Word http://vil.mcafeesecurity.com/vil/content/v_139539.htm http://www.sarc.com/avcenter/venc/data/trojan.mdropper.h.html http://secunia.com/virus_information/29277/mdropper.h/ http://securityresponse.symantec.com/avcenter/venc/data/bac

This is rated low-risk everywhere and it’s not widespread — still folks should be careful with suspicious Word documents.

MDropper Trojan – Exploits Zero Day vulnerability in MS Word

https://vil.mcafeesecurity.com/vil/content/v_139539.htm

http://www.sarc.com/avcenter/venc/data/trojan.mdropper.h.html

http://secunia.com/virus_information/29277/mdropper.h/

http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ginwui.html

Trojan.Mdropper.H is a Trojan horse that downloads other risks onto the compromised computer. This Trojan exploits a 0 day Microsoft Word vulnerability to drop Backdoor.Ginwui.

Thanks to friend, Harry Waldron, for the update.

roger_grimes
Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

More from this author