We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Microsoft warns of Word attacks

RTF-based exploits making the rounds

Hackers are exploiting a vulnerability in Microsoft Word to plant malware on Windows PCs, Microsoft has warned.

The bug in Microsoft Word 2002, 2003, 2007 and 2010 was patched on 9 November as part of Microsoft's monthly security update .

Word 2008 and 2011 for the Mac have also been patched, but Microsoft has not yet issued a fix for the same flaw in the older Word 2004. The circulating attacks affect only Windows versions of the suite, however.

According to the Microsoft Malware Protection Centre (MMPC), the group that investigates attack code and issues signature updates for the company's antivirus software, the first in-the-wild exploits were detected last week.

When Microsoft shipped the Word patch last month, it rated the bug as "1" on its exploitability index, meaning it believed a working attack would pop up within 30 days.

The attack uses a malicious RTF (Rich Text Format) file to generate a stack overflow in Word on Windows, said MMPC researcher Rodel Finones. Following a successful exploit, the attack code downloads and runs a Trojan horse on the compromised computer.

Finones said that the code "reliably exploits this [Word] vulnerability."

Last month, Microsoft rated the RTF vulnerability as "critical" in Word 2007 and 2010, but as "important" in all other affected versions.

At the time, outside researchers had put their bets on the bug as a hacker choice because users running Office 2007 or 2010 could be attacked if all they did was preview a specially-crafted RTF document in the Outlook e-mail client.

"Once a [malformed] message hits the Outlook preview pane, remote code can be executed. You should patch this right away," Jason Miller, the data and security team manager for Shavlik Technologies, said on the day Microsoft released the patch.

Finones urged users who have not yet installed the November patch to do so as soon as possible.

More information about the vulnerability can be found in the MS10-087 security bulletin.

The MS10-087 update can be downloaded and installed using Microsoft Update and Windows Server Update Services (WSUS).


IDG UK Sites

LG G4 launch live blog: What to expect from the LG G4 launch

IDG UK Sites

Apple Watch release day: Twitter reacts

IDG UK Sites

Doctor Who scoops VFX gong at BAFTA TV Craft Awards

IDG UK Sites

Apple Watch buying guide, price list & where to buy today: Which Apple Watch model, size, material,?......