{"id":207,"date":"2006-05-23T03:59:13","date_gmt":"2006-05-23T03:59:13","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/05\/trojan-for-the-word-vulnerability-in-the-wild\/"},"modified":"2015-09-09T19:43:56","modified_gmt":"2015-09-09T11:43:56","slug":"trojan-for-the-word-vulnerability-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/05\/trojan-for-the-word-vulnerability-in-the-wild\/","title":{"rendered":"Trojan for the Word Vulnerability in the Wild"},"content":{"rendered":"
[ad]<\/p>\n
We all knew it was just a matter of time until the ‘thing’ was out. <\/p>\n
PandaLabs has detected the appearance of 1Table.A, a malicious code that exploits a recently detected critical vulnerability in Microsoft Word, and which also affects versions of MS Office 2003 and XP.<\/p><\/blockquote>\n
Microsoft confirmed<\/a> today the existence of this vulnerability and apparently is working<\/a> on a hotfix. <\/p>\n
This security problem allows the execution of code on affected systems and, more dangerously, allows the construction of malicious code which is indistinguishable at first glance from a normal Word file.<\/p><\/blockquote>\n
That’s more than enough to get 70%* of the people who use Microsoft Office to download and execute the file. If they open .BAT, .COM and .EXE, opening a .DOC is everyday work.<\/p>\n
This attack is not limited to .DOC files, still, they will be the most used extension. It can take place with a .XLS file with an embedded Word document.<\/p>\n
1Table.A – the new trojan – is detected by most of the antivirus software, however, user’s should have they’r eyes open until patch is released by Microsoft (even if they don’t consider it critical<\/a>)<\/em><\/p>\n
Source:<\/strong> NHS<\/a><\/p>\n