locked
What's the problem with Microsoft Word ? RRS feed

  • Question

  • In the last two months alone, at least four major security flaws involving Microsoft Word have come to light. All are "zero day" flaws, meaning Microsoft and security organizations became aware of them at the same time that destructive hackers became aware of them. In many "zero day" cases, it's the exploitation of the flaw that brings it to the attention of the software companies; in other cases, the software companies announce the flaw and hackers immediately take advantage of it before a patch can be released. The strange thing about the latest Word problems is that almost eight weeks after the first one hit the news because it was exploited by attackers, Microsoft still hasn't released a patch to fix it.

    The first in this string of security holes popped up in early December. This flaw affects computers running Word 2000, 2002 and 2003; Word 2004 for Mac and Word 2004 version X for Mac; Word Viewer 2003; and Microsoft Works 2004, 2005 and 2006. An attacker hides a piece of code in a Word document and puts it on a Web site for download or sends it out as an e-mail attachment. When a user downloads or opens the document, the attacker can remotely control the user's computer and execute a wide array of codes under the user's own login. This flaw came to Microsoft's attention on December 5, 2006, when people started reporting attacks.

    A second, previously unknown flaw started to draw attention just a week later, this one also allowing a remote attacker to take control of a user's PC. According to Microsoft, though, this flaw exploits a entirely different security hole -- one that opens when Word undergoes a specific error. Apparently, this attack doesn't require a user to download a malicious file; it only requires the Word program on the person's computer to experience this error, at which point an attacker can enter the system and run malicious code. It affects Word 2000, 2002 and 2003 and Word Viewer 2003.

    Security experts have attributed these two security holes to memory-corruption flaws in the Word programs. Days later, a third flaw was revealed. This one also allows for remote access and control of a user's machine and has been tied to a buffer-overflow problem in Word. It came to public attention when a software expert called "Disco Johnny" published a proof-of-concept code on the Web that showed how a malicious hacker could exploit it, essentially providing instructions for running an attack in addition to showing Microsoft it has yet another problem. And about five weeks later, on January 25, a fourth security hole became the subject of a malicious attack that begins when a user opens a rigged Word file sent as an e-mail attachment and has similar results to the previous attacks: Remote access and control of an entire system if it's running Word 2000. If the computer is running Word 2003 or Word XP, it only crashes the computer, as opposed to opening it up to remote control.

    These four issues are only the latest in a series of attacks exploiting previously undiscovered flaws in a wide array of Microsoft Office applications. In September 2006, hackers started exploiting another zero-day Word flaw, this one only affecting Word 2000. A user had to open an infected Word 2000 document using the Word 2000 program in order for the virus, MDropper.Q, to drop a piece of code in the user's PC. This allowed a remote attacker to take control of the infected PC. Security sources report that this flaw still has not been patched, almost five months later. Microsoft has, however, patched several of the flaws involving other Office programs, including security holes in versions of PowerPoint and Excel.

    Since no security patches have been released for the Word flaws, Microsoft recommends installing multiple layers of security software and updating the versions vigilantly. Beyond that, we can only use the wariness we've become accustomed to when opening attachments or downloading files, with an extension into a traditionally safer area: Now, if it ends with .doc, don't touch it unless you know and trust the source.

    Friday, March 16, 2007 1:24 PM

Answers

  • really a good information. please check it.
    Friday, March 16, 2007 1:25 PM
  • i hope they'll release security patches soon.....
    Saturday, March 17, 2007 4:47 AM
  • i'm also waiting for the fixes.
    Saturday, March 17, 2007 10:00 AM

All replies

  • really a good information. please check it.
    Friday, March 16, 2007 1:25 PM
  • i hope they'll release security patches soon.....
    Saturday, March 17, 2007 4:47 AM
  • i'm also waiting for the fixes.
    Saturday, March 17, 2007 10:00 AM
  • dear nice peice of info, and i will post one more MSWORD flaw here under your thread within few days as my friend will tell me bout it,

    the problem is like when u write some code, which i will post shorty fills MSword 350 pages  with a single statement "quick brown fox jumped over lazy dog"

    Sunday, March 18, 2007 5:55 PM
  • please do it kanav. we are waiting for that.
    Sunday, March 18, 2007 6:16 PM
  • Waiting for the code... would also like to know how it works.. like how do they hack into the software this way...
    Monday, March 19, 2007 2:17 PM
  • @KANAV - expecting eagerly for your code...
    Wednesday, May 23, 2007 5:09 PM
  • you should have posted this in the  microsoft office msdn forums man...then you would have got really heated discussion...
    Thursday, May 24, 2007 1:33 PM
  • Do you have the service pack 2 of Microsoft Office installed in your PC this might help otherwise visit the site for the latest service pack and if this is a major loophole then they must have done something to stop this kind of stuff
    Saturday, May 26, 2007 7:59 PM