MS Word Vulnerabilities Reported on Exploit Sites

Apr 11, 2007

Microsoft says it has found no attacks attempting to exploit the reported Office vulnerabilities, but it is continuing to investigate.

Microsoft is investigating public reports of vulnerabilities in Microsoft Office.

Reports of several new security holes in Microsoft Office have been made public on known exploit sites. The company did not release specific information about the vulnerabilities, citing potential risk to users.

"Microsoft is not aware of any attacks attempting to use the reported vulnerability or of customer impact at this time," said a spokesperson for the company, based in Redmond, Wash. "Microsoft will continue to investigate the public reports to help provide additional guidance for customers as necessary."

Postings about the vulnerabilities indicate that exploitation could lead to a program crash or the execution of arbitrary code.

Amol Sarwate, manager of vulnerability research at Qualys, a provider of on-demand security risk and compliance management solutions, based in Redwood Shores, Calif., said the widespread use of Microsoft Word makes the vulnerabilities even more threatening.

"Considering the prevalence of Microsoft Word, the fact that these vulnerabilities target unsuspecting users and also the consequence - total compromise of the system - I would say these vulnerabilities are very serious," Sarwate said. "In addition, zero-day targeted attacks - for CVE-2007-0870 - have amplified the need for a patch."

However, Sarwate added it is important to differentiate between proof-of-concept code and exploit code. "When POC - zero-day - code exists, is does raise the concern, but does not necessarily mean that exploit code will be released or that people will be exploited," he said.

Copyright 2007 by Ziff Davis Media, Distributed by United Press International

Explore further: Unlocking the potential of simulation software

add to favorites email to friend print save as pdf

Related Stories

Time to watch out for SMS worms on Android devices

Jul 01, 2014

Google's Android now dominates 80% of the smart phone market. Of the major phone operating systems, Android is the most vulnerable to security breaches and yet perceptions haven't caught up with reality. ...

Adobe Flash Player updates confront zero-day exploit

Feb 21, 2014

(Phys.org) —An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to ...

Which phone is most vulnerable to malware?

Apr 30, 2014

As each new computer virus attack or vulnerability comes to light, millions instinctively check their computer to see if their anti-malware application is up to date. This is a good idea and they are wise ...

Recommended for you

Unlocking the potential of simulation software

3 hours ago

With a method known as finite element analysis (FEA), engineers can generate 3-D digital models of large structures to simulate how they'll fare under stress, vibrations, heat, and other real-world conditions.

Indonesian capital threatens to ban Uber car app

23 hours ago

The Indonesian capital is threatening to shut down controversial smartphone car-hailing service Uber due to licensing issues a week after it officially launched in the city, an official said Wednesday.

User comments : 0