Vulnerabilities / Threats

11/14/2017
05:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Microsoft Word Vuln Went Unnoticed for 17 Years: Report

Researchers claim Microsoft Word vulnerability, patched today, has existed for 17 years.

Microsoft today rolled out 53 security patches for the month of November as part of its regular Patch Tuesday update. One of the fixes addresses CVE-2017-11882, a flaw that has existed, unnoticed, in Microsoft Word for the past 17 years.

The fixes announced today address flaws in Windows, Internet Explorer, Office, Edge, ASP.NET Core, .NET Core, and Chakra Core. Twenty of the CVEs are labeled Critical, 30 are ranked Important, and three are Moderate. Three of the bugs today are publicly known but none are categorized as being under active attack, and there were no zero-days this month.

Researchers at Embedi, a firm specializing in security for embedded devices, today released a report on a 17-year-old remote code execution vulnerability in Microsoft Office, which was patched today. They claim it has not been patched and Microsoft did not know it existed.

CVE-2017-11882 is a Microsoft Office Memory Corruption Vulnerability, Microsoft reports. It exists in Office software when the software doesn't properly handle objects in memory. If successfully exploited, it could let an attacker run arbitrary code in the context of the user.

If a user has administrative privileges, an attacker who took advantage of this exploit could take control of an infected system and install programs, view and edit data, or create new accounts with full user rights. Microsoft says this CVE is more dangerous for administrative users.

CVE-2017-11882 could be exploited with a phishing attack; victims need only to open a malicious file with an affected version of Microsoft Office or Microsoft WordPad. In a web-based attack, an attacker could host a website with a malicious file designed to exploit the CVE.

The exploit was created by Embedi experts, who report it works with all Microsoft Office versions released in the past 17 years, including Office 365. It works on versions of Microsoft Windows, including the Creators Update, and it's relevant for all types of architecture. This flaw doesn't interrupt a user's work within Microsoft Office, Embedi explains. Once the document is opened, it doesn't require any further user interaction.

"The only hindrance here is the protected view mode because it forbids content execution (OLE/ActiveX/Macro)," researchers say. However, this could be bypassed with social engineering. An attacker could, for example, ask a user to save a file to the cloud using OneDrive or Google Drive. When opened, protected view mode would not be enabled.

Embedi researchers reported the vulnerability to Microsoft in March 2017 and the final fix was issued today.

Greg Wiseman, senior security researcher at Rapid7, points out CVE-2017-11882 as one of the flaws which could be especially dangerous.  

"No non-browser vulnerabilities are considered critical this month, but with a little bit of social engineering, an attacker could theoretically combine one of the Office-based RCE vulnerabilities like CVE-2017-11878 or CVE-2017-11882 with a Windows Kernel privilege escalation weakness such as CVE-2017-11847 to gain complete control over a system," he says.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
allhealthpost
50%
50%
allhealthpost,
User Rank: Apprentice
11/17/2017 | 1:34:22 AM
Re: Define a virus
great post to read
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
11/16/2017 | 3:55:12 PM
17 years
> 17 years

Considering my preferred version is Office 93, I should be good. ;)

(JK...but I do miss the old days of MS-DOS and Windows 3.x.)
bluvg
50%
50%
bluvg,
User Rank: Apprentice
11/15/2017 | 2:46:29 PM
Re: Define a virus
Looks like Linux-based Android isn't doing so well, security-wise. The recent Bluetooth and KRACK flaws hit Android much harder than both Windows and iOS, and were patched later. The "many eyes" notion has failed in high-profile ways recently as well, with several long-standing bugs affecting Linux going unnoticed for over a decade.
REISEN1955
0%
100%
REISEN1955,
User Rank: Ninja
11/15/2017 | 8:14:11 AM
Define a virus
Years ago I read an editorial about define standards for a virus and on each and every point, Microsoft Windows ITSELF met the criteria pefectly.   Just to keep things in perspective and now the Linux people can laugh.
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.