Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Overhauls Office; Fixes a Dozen Vulnerabilities

Severity: High

11 March, 2008

Summary:

  • These vulnerabilities affect: Most current versions of Microsoft Office for Windows, and in some cases for Mac (and some other Office-related programs)
  • How an attacker exploits them: By enticing you to open maliciously crafted Office documents, visit a malicious web site, or click a malicious link
  • Impact: An attacker can execute code, potentially gaining complete control of your computer
  • What to do: Install the appropriate Office or Office related patches immediately

Severity: High

11 March, 2008

Summary:

  • These vulnerabilities affect: Most current versions of Microsoft Office for Windows, and in some cases for Mac (and some other Office-related programs)
  • How an attacker exploits them: By enticing you to open maliciously crafted Office documents, visit a malicious web site, or click a malicious link
  • Impact: An attacker can execute code, potentially gaining complete control of your computer
  • What to do: Install the appropriate Office or Office related patches immediately

Exposure:

Today, Microsoft released four Critical security bulletins describing a dozen vulnerabilities found in components or programs that ship with Microsoft Office for Windows, and in some cases Office for Mac. One of the vulnerabilities also affects Microsoft Visual Studio .NET, Biztalk Server, Commerce Server, and Internet Security and Acceleration Sever. Each vulnerability affects different versions of Office to a different extent.

The dozen flaws affect different components and applications within Office, but the end result is always the same. Either by enticing one of your users to download and view a specially crafted Office document, or by luring one of your users to a malicious web page, an attacker can exploit any of these vulnerabilities to execute code on the victim’s computer, usually inheriting that user’s level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the victim’s machine.

An attacker can exploit many of these flaws using just about any kind of Office document. While two of Microsoft’s bulletins specifically mention Excel (.xls) files, one bulletin simply mentions “Office files,” which could refer to any Office document type, including Word (.doc), PowerPoint (.ppt), and Publisher (.pub) documents. So, beware of all unexpected Office documents.

If you’d like to learn more about each individual flaw, drill into the “Vulnerability Details” section of the security bulletins listed below:

  • MS08-014: Multiple Excel vulnerabilities. This bulletin describes seven vulnerabilities involving how Excel handles maliciously crafted Excel documents. By tricking one of your users into downloading and opening an Excel document, an attacker could exploit this flaw to execute code, potentially gaining complete control of that user’s computer.
  • MS08-015: Outlook mailto: URI handling vulnerability. Outlook doesn’t properly handle specially crafted mailto: URIs. If an attacker can entice one of your users to click a malicious mailto: link, typically found on a web site, he can exploit this vulnerability to execute code on that user’s computer, potentially gaining total control over it.
  • MS08-016: Two Office remote code execution vulnerabilities. This bulletin describes two vulnerabilities involving how Office handles various maliciously crafted Office documents. By tricking one of your users into downloading and opening an Office document, an attacker could exploit this flaw to execute code, potentially gaining complete control of that user’s computer.
  • MS08-017: Two Office Web Component vulnerabilities. Office Web Components allow you to either publish Office spreadsheets, charts, and databases to your web site, or to view such Office content on a web site. The Web Components suffer from two memory corruption vulnerabilities. By enticing one of your users to a malicious web site, an attacker could exploit either vulnerability to execute code on that user’s machine, and possibly gain control of it.

In January, Microsoft released an early advisory warning customers of a zero day vulnerability in Microsoft Excel, which attackers are currently exploiting in targeted attacks. Microsoft has confirmed that MS08-014 fixes this outstanding Excel vulnerability. Since Microsoft rates all of these bulletins as Critical, and one bulletin fixes a flaw that attackers are currently exploiting in the wild, we consider these flaws a serious risk. You should patch them immediately.

Solution Path

Microsoft has released patches for Office (and a few related programs) to correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.

MS08-014:

Excel update for:

MS08-015:

Outlook update for:

MS08-016:

MS08-017:

Office Web Components update for:

For All WatchGuard Users:

Attackers exploit some of these vulnerabilities by enticing your users into downloading and viewing various Office documents. You can configure some of WatchGuard’s Firebox models to block all Office documents. However, most organizations need to allow Office documents in order to conduct business, and blocking them could bring your business to a halt. Furthermore, the remaining attacks travel as normal-looking HTTP traffic, which you must allow if your network users need to access the World Wide Web. Therefore, the patches above are your best solution.

Status:

Microsoft has released patches correcting these issues.

References:

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...