Unpatched Word Vulnerability

 
Published: 2008-07-09,
Last Updated: 2008-07-09 02:20:40 UTC
by Johannes Ullrich (Version: 1)
0 comment(s)

What a busy day! Microsoft just released an advisory with details about a new vulnerability in Word, which is currently being exploited in targeted attacks.

Earlier today, we found a mention of such a vulnerability in an advisory published by Symantec. Symantec published this advisory based on a sample our handler Maarten sent to our malware distribution list. The file in question was actually part of a bundle of files he sent. As far as we know, this is the only sample we had which exploits this vulnerability.

Please read the Microsoft advisory carefully. According to Microsoft's testing, it only affects Microsoft Office Word 2002 Service Pack 3. This is one reason we didn't consider this particular sample as we didn't test it with this particular version of Office.

Needless to say, this is yet another reminder that exploits like this are likely to continue in targeted attacks. Feel free to send us suspect samples. Luckily, there is some anti-virus coverage in this particular case.

As a sidenote: Maarten will be talking about his work with these targeted exploits as SANSFIRE . Better register now !

The md5 hash of the particular sample we have: 0x7C0812F6207FF8E9FEF016DE48786168 (attachement.doc). Excerpt from Virustotal:

F-Secure 7.60.13501.0 2008.07.03 Trojan-Dropper.MSWord.Agent.cq
GData 2.0.7306.1023 2008.07.07 Trojan-Dropper.MSWord.Agent.cq
Kaspersky 7.0.0.125 2008.07.07 Trojan-Dr
Sophos 4.31.0 2008.07.07 Troj/MalDoc-Fam
Webwasher-Gateway 6.6.2 2008.07.07 Exploit.Win32.Ginwui.gen!MS-Word (suspicious)

Links:

Symantec: www.securityfocus.com/bid/30124/info

Microsoft Advisory: www.microsoft.com/technet/security/advisory/953635.mspx

Microsoft Blog Post: blogs.technet.com/msrc/archive/2008/07/08/ vulnerability-in-microsoft-word-could-allow-remote-code-execution.aspx

 

0 comment(s)
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值