11 January 2007 | 5,275 views

Microsoft Word 0-day Exploits – QUESTION.DOC

Check Your Web Security with Acunetix

There’s been quite a few Microsoft related exploits recently, but not in Windows, people have moved their focus towards the application layer and the top of the OSI stack.

This time it was a 0-day Vulnerability in Microsoft Word.

The original news comes from SANS Internet Storm Center Diary (ISC).

Microsoft has reported Word 2003, Word 2002, Word 2000 and Word Viewer 2003 are reportedly affected.

The vulnerability is being exploited in the wild, the malicious document is called QUESTION.DOC.

Password stealing Trojan spreads with this vulnerability, link to the McAfee PWS-Agent.g writeup.

US-CERT reported today that “Word fails to properly handle malformed data structures allowing memory corruption to occur”. This vulnerability is public CVE-2006-6456 now.

Advertisements



Recent in Exploits/Vulnerabilities:
- Rowhammer – DDR3 Exploit – What You Need To Know
- Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD
- Google Expands Pwnium Year Round With Infinite Bounty

Related Posts:
- Trojan for the Word Vulnerability in the Wild
- Introducing WHCC – Web Hack Control Center
- CeWL – Custom Word List Generator Tool for Password Cracking

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 229,605 views
- AJAX: Is your application secure enough? - 119,412 views
- eEye Launches 0-Day Exploit Tracker - 85,200 views

Low-cost VPS Hosting

One Response to “Microsoft Word 0-day Exploits – QUESTION.DOC”