Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/30/2006
01:20 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Windows Flaw, Word Trojan Found

Microsoft is looking into another possible Windows hole, and a new Trojan rides in on Word docs

Microsoft is investigating a new flaw in the Windows operating system, while researchers have discovered a new Trojan that poses as a legitimate Word document.

Microsoft acknowledged the possible Windows vulnerability in its Security Response Center Blog last night, but didn't provide details about the hole, which it says it learned about via proof-of-concept code posted on the Web. An attacker could exploit the Windows hole using Internet Explorer; the user would activate the malware by clicking on an infected link.

The hole hasn't been exploited yet, Microsoft says. "We are not aware of any attacks attempting to use the reported vulnerabilities or of customer impact at this time," says a Microsoft spokesperson. But the spokesperson says the flaw may require a security advisory or a security update in one of its Patch Tuesday releases.

Separately, Sophos reported the discovery of a new Word Trojan, called Kukudro-A. The Trojan isn't exploiting any holes in Word, explains Gregg Mastoras, security analyst for Sophos. The exploit is a combination of a spam email posing as an Apple, HP, and Sony laptop sales pitch, and a malware executable. When you open the infected files, called prices.zip, apple_prices.zip, or sony_prices.zip, they launch my_Notebook.doc, the infected Word file with the "pricing" information. Once a user opens the file, the Trojan silently slips into his computer, and the user is none the wiser, Mastoras says.

About 35 percent of malware incidents reported to Sophos in the past 24 hours have included this virus, so there is evidence it's spreading, Mastoras says. Sophos, Symantec, and McAfee all have added protection for Kukudro-A. Symantec and McAfee classify it as a low risk.

According to Microsoft, the exploit targets an old vulnerability in Word that had been patched (Security Bulletin), so users with software that's up-to-date aren't at risk.

This is latest in a long line of security alerts, patches, and patches of patches that Microsoft has suffered in the past month. (See Microsoft Works Around Excel Bug .) And this isn't the first time Word has been targeted, nor its cousin Excel. "It looks like some malware authors are looking more into apps like Excel and Word and seeing what they can do, especially if they are doing targeted attacks," says Jonathan Singer, a Yankee Group analyst.

It's not difficult for an attacker to fold a Trojan into a Word file, Mastoras says. It just takes some social engineering (like a tempting spam message), and a victim willing to open an infected file.

Microsoft has gotten a bad rap with its software problems, and deservedly so, says David Pensak, CTO and founder of application security startup V.i. Laboratories. (See Startup Locks Down Apps.) "But they have a lot of fundamental design problems in their software… They made some [poor] decisions before people understood how evil the hackers are," he says.

Meanwhile, Microsoft isn't mincing words about its position on vulnerability disclosure. The software company earlier this week criticized a researcher's public disclosure of how to exploit a hole in a remote access vulnerability in Windows.

The company took a kindler and gentler tone today on the latest disclosure. "As always, Microsoft continues to encourage responsible disclosure of vulnerabilities to minimize risk to computer users," says the Microsoft spokesperson. "Microsoft supports the commonly accepted practice of reporting vulnerabilities directly to a vendor, which serves everyone's best interests. This practice helps to ensure that customers receive comprehensive, high-quality updates for security vulnerabilities without exposure to malicious attackers while the update is being developed."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Companies mentioned in this article:

  • Microsoft Corp. (Nasdaq: MSFT)
  • Sophos plc
  • V.i. Laboratories Inc.
  • Yankee Group Research Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    Edge-DRsplash-10-edge-articles
    7 Old IT Things Every New InfoSec Pro Should Know
    Joan Goodchild, Staff Editor,  4/20/2021
    News
    Cloud-Native Businesses Struggle With Security
    Robert Lemos, Contributing Writer,  5/6/2021
    Commentary
    Defending Against Web Scraping Attacks
    Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-16632
    PUBLISHED: 2021-05-15
    A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
    CVE-2021-32073
    PUBLISHED: 2021-05-15
    DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
    CVE-2021-33033
    PUBLISHED: 2021-05-14
    The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
    CVE-2021-33034
    PUBLISHED: 2021-05-14
    In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
    CVE-2019-25044
    PUBLISHED: 2021-05-14
    The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.