When this story was originally reported, it misquoted Argeniss’s Cesar Cerrudo. The error has been corrected within the text below.
There’s now one more reason to be careful about opening Microsoft Office attachments.
Microsoft warned Tuesday of a new, unpatched memory corruption error in its word-processing software, and said that it was investigating reports of “limited” attacks that exploit the problem.
The bug can be exploited by adding a string of characters in a Word file that can corrupt the PC’s memory and allow the attacker to run unauthorized software on the system, Microsoft wrote in a security advisory. The bug affects many versions of the software, including Word 2000, 2002 and 2003, the Word Viewer 2003 and several versions of Microsoft Works. It is rated “critical” by the FrSIRT website, which compiles a list of software vulnerabilities.
As automatic security updates have become commonplace, attackers have focused more on developing attacks that leverage this kind of unpatched hole in the software, sometimes called 0day attacks. This trend has forced Microsoft to produce a growing number of software updates in recent months.
In particular, hackers turned their attention to Microsoft’s Office products, which some researchers consider to be a more fruitful source of bugs than the Windows operating system.
“Cybercriminals know that 0days are very valuable and can be used to make lots of money,” said Cesar Cerrudo, chief executive officer of security research firm Argeniss, in Parana, Argentina. These vulnerabilities can be exploited to install spyware or dangerous Trojan horse programs, or to add the victim’s computer to a network of compromised PCs, called a botnet, which can then be used to send out spam or attack other systems, he said.
Microsoft’s next set of security updates is due to be released on Dec. 12.
-Robert McMillan, IDG News Service (San Francisco Bureau)
Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.