Microsoft said it's aware only of limited, targeted attempts to exploit this vulnerability, which could allow an attacker to execute code remotely.
Microsoft on Thursday issued a security advisory concerning a zero-day vulnerability in Microsoft Office PowerPoint.
If a user can be convinced to open a maliciously crafted PowerPoint file -- contained in an e-mail message or via a Web site link -- the vulnerability could allow an attacker to execute code remotely.
"Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background," explain Microsoft security engineer Cristian Craioveanu and program manager Ziv Mador in a blog post.
Affected versions of Microsoft Office PowerPoint for Windows include 2000 SP3, 2002 SP3, and 2003 SP3, as well as Microsoft Office 2004 for Mac. Office 2007, the most recent Office suite, is not affected.
Microsoft said that it's aware only of limited, targeted attempts to exploit this vulnerability.
In another blog post, Microsoft Security Response Center engineers Bruce Dang and Jonathan Ness offer further information about the problem.
"The malware samples we have seen exploiting this vulnerability are the first reliable exploits we have seen in the wild that infect Office 2003 SP3 with the latest security updates," they state. "Office 2003 SP3 (released Sept 2007) had a good run being safe from the bad guys but we missed this bug while back-porting fixes found in the Office 12 fuzzing effort to Office 2003 SP3. SP3 was a massive security push that we recommend all Office 2003 customers apply (this vulnerability notwithstanding)."
Fuzzing is a software testing method that involves supplying an application with random data in an effort to make it crash or show other effects.
Dang and Ness explain that PowerPoint files in the latest XML file format are not affected. Organizations that have migrated to PPTX, PowerPoint's XML format, can disable the affected binary file format through the FileBlock registry settings provided in the security advisory.
Another alternative is to force older PowerPoint files to open in MOICE, the Microsoft Isolated Conversion Environment, a security feature that converts various Microsoft Office binary file formats into Office Open XML format.
2009 marks the 12th year that InformationWeek will be monitoring changes in security practices through our annual research survey. All who complete the survey and provide their contact information will be entered into our prize drawing for a 46-inch Sony Bravia V Series LCD flat-panel HDTV, valued at $1,800. Find out more, and take part by April 26.
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024