Severity: High
13 May, 2008
Summary:
- These vulnerabilities affect: Many current versions of Microsoft Office for Windows and Mac (also affects Word Viewer and Office Compatibility Pack)
- How an attacker exploits them: By enticing you to open maliciously crafted Office documents
- Impact: An attacker can execute code, potentially gaining complete control of your computer
- What to do: Install the appropriate Office patches immediately
Exposure:
Today, Microsoft released two security bulletins describing three vulnerabilities found in components or programs that ship with Microsoft Office for Windows (and in one case, Office for Mac). Some of the vulnerabilities also affect Microsoft Word Viewer and the Office Compatibility Pack. Each vulnerability affects different versions of Office to a different extent. The three flaws affect different components and applications within Office, but the end result is always the same: By enticing one of your users into downloading and opening a maliciously crafted Office document, an attacker can exploit any of these vulnerabilities to execute code on a victim’s computer, usually inheriting that user’s level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the user’s machine.
Severity: High
13 May, 2008
Summary:
- These vulnerabilities affect: Many current versions of Microsoft Office for Windows and Mac (also affects Word Viewer and Office Compatibility Pack)
- How an attacker exploits them: By enticing you to open maliciously crafted Office documents
- Impact: An attacker can execute code, potentially gaining complete control of your computer
- What to do: Install the appropriate Office patches immediately
Exposure:
Today, Microsoft released two security bulletins describing three vulnerabilities found in components or programs that ship with Microsoft Office for Windows (and in one case, Office for Mac). Some of the vulnerabilities also affect Microsoft Word Viewer and the Office Compatibility Pack. Each vulnerability affects different versions of Office to a different extent. The three flaws affect different components and applications within Office, but the end result is always the same: By enticing one of your users into downloading and opening a maliciously crafted Office document, an attacker can exploit any of these vulnerabilities to execute code on a victim’s computer, usually inheriting that user’s level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the user’s machine.
According to Microsoft’s bulletins, an attacker can exploit these flaws using three types of Office documents: Word (.doc), Publisher (.pub), and Rich Text Format (.rtf). So beware of all unexpected documents you receive with these file extensions.
If you’d like to learn more about each individual flaw, drill into the “Vulnerability Details” section of the security bulletins listed below:
- MS08-026: Two Word Vulnerabilities, rated Critical
- MS08-027: Publisher Code Execution Vulnerability, rated Critical
Solution Path
Microsoft has released patches for Office to correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.
Word update for:
- Office 2000 w/SP3
- Office XP w/SP3
- Office 2003 w/SP3
- 2007 Microsoft Office System w/SP1
- Office 2004 for Mac
- Office 2008 for Mac
- Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Publisher update for:
For All WatchGuard Users:
While you can configure certain WatchGuard Firebox models to block Word, Publisher, and Rich Text Format documents, some organizations need to allow them in order to conduct business. Therefore, these patches are your best recourse. Temporarily though, you may still want to block these Office documents until you are able to install Microsoft’s patches.
If you want to block Word, Publisher, and Rich Text Format documents, follow the links below for video instructions on using your Firebox proxy’s content blocking features to block .doc, .pub, and .rtf files by their file extensions:
- Firebox X Edge running 10.x
- How do I block files with the FTP proxy? (Video, 2:30)
Windows Media, 17.4MB / QuickTime, 11.8MB - How do I block files with the HTTP proxy? (Video, 2:52)
Windows Media, 32MB / QuickTime, 28.6MB - How do I block files with the POP3 proxy? (Video, 2:35)
Windows Media, 17.6MB / QuickTime, 16.5MB - How do I block files with the SMTP proxy? (Video, 2:18)
Windows Media, 12.2MB / QuickTime, 9.1MB
- How do I block files with the FTP proxy? (Video, 2:30)
- Firebox X Core and X Peak running Fireware 10.x
- How do I block files with the FTP proxy? (Video, 2:30)
Windows Media, 25.2MB / QuickTime, 9.1MB - How do I block files with the HTTP proxy? (Video, 2:52)
Windows Media, 38.2MB / QuickTime, 10.7MB - How do I block files with the POP3 proxy? (Video, 2:35)
Windows Media, 23.2MB / QuickTime, 10.1MB - How do I block files with the SMTP proxy? (Video, 2:18)
Windows Media, 25.6MB / QuickTime, 9.0MB
- How do I block files with the FTP proxy? (Video, 2:30)
Status:
Microsoft has released Office updates to fix these vulnerabilities.