Results 1 to 2 of 2

Thread: MS Word Vulnerability

  1. #1
    Senior Moment blueball's Avatar
    Join Date
    Aug 2005
    Location
    Edinburgh
    Posts
    2,426
    Thanks
    846
    Thanked
    379 times in 294 posts
    • blueball's system
      • Motherboard:
      • Asus Z390A
      • CPU:
      • i9-9900KS
      • Memory:
      • Kingston 64GB (2x32GB) DDR4 2400MHz
      • Storage:
      • 2TB Samsung 970 EVO Plus NVMe PCIE M.2 plus Samsung 860 EVO 4TB SSD
      • Graphics card(s):
      • ASUS TUF RTX 3080 Ti GAMING OC
      • PSU:
      • Corsair HX850 850 W Full Modular 80 Plus Platinum
      • Case:
      • Corsair Carbide 330R Ultra Silent Midi Tower
      • Operating System:
      • Win 10 Pro x64
      • Monitor(s):
      • IIYAMA 3461WQ IPS 34" 3440x1440 plus BenQ GW2765HT IPS 27" 2560x1440
      • Internet:
      • Plusnet 28Mb

    Exclamation MS Word Vulnerability

    From http://safecomputing.open.ac.uk/latest_bulletins.htm

    -----------------------------------------------------------------------------------------------
    B U L L E T I N
    Microsoft is working on a fix for a vulnerability in Windows which may be triggered when malicious documents are opened. The only immediate defence is to be vigilant and not to open suspicious files attached to unsolicited emails.

    The installer file is currently contained in a malicious Microsoft Word document that exploits a previously unknown security flaw in the Windows kernel that allows remote code execution. Once the user opens the file, the malicious code executed and installs the Duqu remote access Trojan on the system and begins monitoring the network. The nature of the code means that it could be placed in other document types as well as MS Word.

    Duqu appears to have a similar function to Stuxnet. That was a worm that was targeted at and infected a number of industrial control systems in Iran’s nuclear facility in 2010. It is believed that it may target specific organisations, in particular in Europe and the Middle East, in order to steal data.

    Although the malware is not aimed at domestic users, many who work from home are part of large organisations to which those machines are often connected.
    -------------------------------------------------------------------------------------------------
    Rgds,

    BB
    Hexus Trust here and here

  2. #2
    Banhammer in peace PeterB kalniel's Avatar
    Join Date
    Aug 2005
    Posts
    30,748
    Thanks
    1,787
    Thanked
    3,286 times in 2,647 posts
    • kalniel's system
      • Motherboard:
      • Gigabyte Z390 Aorus Ultra
      • CPU:
      • Intel i9 9900k
      • Memory:
      • 32GB DDR4 3200 CL16
      • Storage:
      • 1TB Samsung 970Evo+ NVMe
      • Graphics card(s):
      • nVidia GTX 1060 6GB
      • PSU:
      • Seasonic 600W
      • Case:
      • Cooler Master HAF 912
      • Operating System:
      • Win 10 Pro x64
      • Monitor(s):
      • Dell S2721DGF
      • Internet:
      • rubbish

    Re: MS Word Vulnerability

    One of many already existing vulnerabilities. Same advice as always - don't open documents from untrusted sources or whose contents you don't trust.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Problems with RTFs in Word 2002... any users?
    By JimNastics in forum Software
    Replies: 4
    Last Post: 02-07-2008, 06:07 PM
  2. New vulnerability puts MS Word and Works users at risk
    By Bob Crabtree in forum HEXUS News
    Replies: 3
    Last Post: 07-12-2006, 02:00 PM
  3. Advanced MS Word Templates
    By Matt1eD in forum Software
    Replies: 2
    Last Post: 09-03-2006, 09:16 AM
  4. English Slang Terms Explained.
    By Stewart in forum General Discussion
    Replies: 22
    Last Post: 22-12-2003, 02:08 PM
  5. Replies: 0
    Last Post: 20-08-2003, 11:42 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •