Microsoft Challenges Newest Word Zero-Day - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications
News
1/31/2007
07:15 PM
50%
50%

Microsoft Challenges Newest Word Zero-Day

The software maker argues that a vulnerability recently identified is not new but a duplicate of a flaw found in December 2006.

Microsoft on Wednesday disputed a security company's claim that a fifth unpatched vulnerability in Microsoft Word was being actively exploited by criminals.

On Tuesday, Cupertino, Calif.-based Symantec notified users it had multiple exploit samples that represented new targeted attacks using a zero-day bug in Word 2003. In a warning sent to customers of its DeepSight threat management service, Symantec said that the attacks were "exploiting a previously undocumented and currently unpatched vulnerability."

Opening a malformed Word 2003 document triggers the vulnerability, which then allows the exploit -- a form of the Mdropper.x Trojan horse -- to inject several malicious files onto the PC.

Microsoft said Wednesday afternoon, however, that its research came to a different conclusion. "Microsoft's initial investigation shows that this is not a new vulnerability but a duplicate of an already known issue" first reported in mid-December, a company spokesperson said in an e-mail.

"Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include issuing a security advisory or providing a security update through our monthly release process, depending on customer needs," the spokesperson added.

If Microsoft is wrong and Symantec is right, the flaw marks the fifth unpatched vulnerability in Word that has come to light since early last month. All have been used by cyber criminals in small-scale attacks against single organizations.

The most recent assault shows even more determination on the part of the attackers. "We have received different documents that use this same exploit from multiple organizations," said Eric Chien, a Symantec researcher, in a note posted Tuesday. "The documents have been each designed specifically for the targeted organization in both language and content."

The next regularly-scheduled Microsoft security updates are to debut in less than two weeks, on Feb. 13.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Top-Paying U.S. Cities for Data Scientists and Data Analysts
Cynthia Harvey, Freelance Journalist, InformationWeek,  11/5/2019
Slideshows
10 Strategic Technology Trends for 2020
Jessica Davis, Senior Editor, Enterprise Apps,  11/1/2019
Commentary
Study Proposes 5 Primary Traits of Innovation Leaders
Joao-Pierre S. Ruth, Senior Writer,  11/8/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll