{"id":413,"date":"2007-01-11T05:30:39","date_gmt":"2007-01-11T05:30:39","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2007\/01\/microsoft-word-0-day-exploits-questiondoc\/"},"modified":"2015-09-09T19:40:24","modified_gmt":"2015-09-09T11:40:24","slug":"microsoft-word-0-day-exploits-questiondoc","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2007\/01\/microsoft-word-0-day-exploits-questiondoc\/","title":{"rendered":"Microsoft Word 0-day Exploits – QUESTION.DOC"},"content":{"rendered":"
[ad]<\/p>\n
There’s been quite a few Microsoft related exploits recently, but not in Windows, people have moved their focus towards the application layer and the top of the OSI stack.<\/p>\n
This time it was a 0-day Vulnerability in Microsoft Word.<\/p>\n
The original news comes from SANS Internet Storm Center Diary (ISC)<\/a>.<\/p>\n Microsoft has reported Word 2003, Word 2002, Word 2000 and Word Viewer 2003 are reportedly affected.<\/p>\n The vulnerability is being exploited in the wild, the malicious document is called QUESTION.DOC<\/em>.<\/p>\n Password stealing Trojan spreads with this vulnerability, link to the McAfee PWS-Agent.g<\/a> writeup.<\/p>\n <\/p>\n