Vulnerabilities / Threats
4/3/2009
04:03 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Issues PowerPoint Security Advisory

Microsoft said it's aware only of limited, targeted attempts to exploit this vulnerability, which could allow an attacker to execute code remotely.

Microsoft on Thursday issued a security advisory concerning a zero-day vulnerability in Microsoft Office PowerPoint.

If a user can be convinced to open a maliciously crafted PowerPoint file -- contained in an e-mail message or via a Web site link -- the vulnerability could allow an attacker to execute code remotely.

"Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background," explain Microsoft security engineer Cristian Craioveanu and program manager Ziv Mador in a blog post.

Affected versions of Microsoft Office PowerPoint for Windows include 2000 SP3, 2002 SP3, and 2003 SP3, as well as Microsoft Office 2004 for Mac. Office 2007, the most recent Office suite, is not affected.

Microsoft said that it's aware only of limited, targeted attempts to exploit this vulnerability.

In another blog post, Microsoft Security Response Center engineers Bruce Dang and Jonathan Ness offer further information about the problem.

"The malware samples we have seen exploiting this vulnerability are the first reliable exploits we have seen in the wild that infect Office 2003 SP3 with the latest security updates," they state. "Office 2003 SP3 (released Sept 2007) had a good run being safe from the bad guys but we missed this bug while back-porting fixes found in the Office 12 fuzzing effort to Office 2003 SP3. SP3 was a massive security push that we recommend all Office 2003 customers apply (this vulnerability notwithstanding)."

Fuzzing is a software testing method that involves supplying an application with random data in an effort to make it crash or show other effects.

Dang and Ness explain that PowerPoint files in the latest XML file format are not affected. Organizations that have migrated to PPTX, PowerPoint's XML format, can disable the affected binary file format through the FileBlock registry settings provided in the security advisory.

Another alternative is to force older PowerPoint files to open in MOICE, the Microsoft Isolated Conversion Environment, a security feature that converts various Microsoft Office binary file formats into Office Open XML format.


2009 marks the 12th year that InformationWeek will be monitoring changes in security practices through our annual research survey. All who complete the survey and provide their contact information will be entered into our prize drawing for a 46-inch Sony Bravia V Series LCD flat-panel HDTV, valued at $1,800. Find out more, and take part by April 26.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.