Vulnerabilities / Threats

4/3/2009
04:03 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Issues PowerPoint Security Advisory

Microsoft said it's aware only of limited, targeted attempts to exploit this vulnerability, which could allow an attacker to execute code remotely.

Microsoft on Thursday issued a security advisory concerning a zero-day vulnerability in Microsoft Office PowerPoint.

If a user can be convinced to open a maliciously crafted PowerPoint file -- contained in an e-mail message or via a Web site link -- the vulnerability could allow an attacker to execute code remotely.

"Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background," explain Microsoft security engineer Cristian Craioveanu and program manager Ziv Mador in a blog post.

Affected versions of Microsoft Office PowerPoint for Windows include 2000 SP3, 2002 SP3, and 2003 SP3, as well as Microsoft Office 2004 for Mac. Office 2007, the most recent Office suite, is not affected.

Microsoft said that it's aware only of limited, targeted attempts to exploit this vulnerability.

In another blog post, Microsoft Security Response Center engineers Bruce Dang and Jonathan Ness offer further information about the problem.

"The malware samples we have seen exploiting this vulnerability are the first reliable exploits we have seen in the wild that infect Office 2003 SP3 with the latest security updates," they state. "Office 2003 SP3 (released Sept 2007) had a good run being safe from the bad guys but we missed this bug while back-porting fixes found in the Office 12 fuzzing effort to Office 2003 SP3. SP3 was a massive security push that we recommend all Office 2003 customers apply (this vulnerability notwithstanding)."

Fuzzing is a software testing method that involves supplying an application with random data in an effort to make it crash or show other effects.

Dang and Ness explain that PowerPoint files in the latest XML file format are not affected. Organizations that have migrated to PPTX, PowerPoint's XML format, can disable the affected binary file format through the FileBlock registry settings provided in the security advisory.

Another alternative is to force older PowerPoint files to open in MOICE, the Microsoft Isolated Conversion Environment, a security feature that converts various Microsoft Office binary file formats into Office Open XML format.


2009 marks the 12th year that InformationWeek will be monitoring changes in security practices through our annual research survey. All who complete the survey and provide their contact information will be entered into our prize drawing for a 46-inch Sony Bravia V Series LCD flat-panel HDTV, valued at $1,800. Find out more, and take part by April 26.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Get Serious about IoT Security
Derek Manky, Global Security Strategist, Fortinet,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.