New trojan detected for Microsoft Word

May 22, 2006

A new Trojan virus has been detected that uses a Microsoft Word vulnerability to infect computers, Panda Software Labs reported.

According to the malware software/research firm, the virus called 1Table.A, releases the Gusi Trojan on the system, allowing infected computers to be controlled remotely.

The vulnerability of the Word program allows "the execution of code on affected systems and, more dangerously, allows the construction of malicious code which is indistinguishable at first glance from a normal Word file," Panda Software Labs said.

It also affects versions of MS Office 2003 and XP, and so far, no patch has been released by Microsoft that addresses the vulnerability.

While, the virus can not send itself automatically, the firm said, it can still be done if a malicious user were to intervene. And still, the virus can be sent as attachments to e-mail messages or downloaded from web pages or P2P file-sharing networks.

"This is a very serious security problem, as it allows malicious Word documents to be created which could take a host of actions on computers," Panda Labs' director Luis Corrons said. "Cyber-crooks have seen the enormous potential of this vulnerability, and it has only taken a few hours until we have seen the first malicious code that exploits it, and no doubt there will be more shortly."

Copyright 2006 by United Press International

Explore further: Encryption made easier: Just talk like a parent

Related Stories

Viruses: You've heard the bad—here's the good

Apr 30, 2015

"The word, virus, connotes morbidity and mortality, but that bad reputation is not universally deserved," said Marilyn Roossinck, PhD, Professor of Plant Pathology and Environmental Microbiology and Biology at the Pennsylvania ...

A Q&A about the malicious software known as ransomware

Apr 08, 2015

Ransomware is a growing threat to computer users, who can suddenly find they're unable to open or use their files when their machines are infected. The malicious software can attack any user—an individual, small business, ...

The hacking tools that terrorise the internet

Mar 06, 2015

Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They're not necessarily in it for the money, ...

Facing the Windows XP apocalypse? Here are some options

Mar 26, 2014

Are you ready for the "XP Apocalypse" on April 8? That's when Microsoft Corp. plans to stop issuing security updates for the aging, but still-popular XP version of its flagship Windows operating system, which ...

Recommended for you

Solar Impulse 2 pilot becomes aviation legend

Jul 04, 2015

At 62 years of age, Swiss Solar Impulse 2 pilot Andre Borschberg has made aviation history with a record breaking solo flight across the Pacific that he has called "an interior journey".

Facegloria: Facebook for Brazil's Evangelicals

Jul 04, 2015

Fluffy clouds waft across a blue sky as you log in and while you chat with friends, Gospel music rings out: welcome to Facegloria, the social network for Brazilian Evangelicals.

Mexico City proposes regulations for Uber

Jul 04, 2015

Mexico City is proposing regulations that would allow Uber and other smartphone-based ride-sharing apps to operate, while requiring drivers and cars to be registered, the city's Office of Legal and Legislative Studies said ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.