Feeds

New MS-Word macro warning

Attack of the killer RTF docs

  • alert
  • submit to reddit

Remote control for virtualized desktops

While it's true that all recent versions of MS Office supposedly require the user's permission to run a macro, a wee little oversight at Redmond Security Central makes it possible for an RTF (Rich Text Format) document opened by Word to execute a macro automatically if it's embedded in a template.

"When Word is used to open a document that’s based on a template, both the document and the template should be checked for macros. This vulnerability involves a case in which this isn’t done correctly," an MS security bulletin explains, doing its damnedest not to say 'we goofed'.

Macros run on a machine or network at the user's level of permission, so of course a malicious one can perform quite a lot of mischief.

In this case, developing an exploit would be child's play. The required template could be fetched from a remote location, such as a Web site to which the feature-rich Word can connect automatically. This would be the preferred MO for someone trying to propagate via e-mail a macro virus exploiting the RTF vulnerability.

RTF is something of the lingua franca of word processing, readable by just about every application ever designed, so it's still in common use wherever people have to collaborate whilst using different software.

Affected programs include Word 97; Word 98 (J); Word 2000; Word 98 (Mac); and Word 2001 (Mac), but not Word 2002.

"Previous versions [of Word] are no longer supported and may or may not be affected by this vulnerability," MS says. It's reasonable to assume that they are affected, so there we have one more little motive to upgrade. ®

Related Links

Word 2K patch
Word 97 patch
(The remaining patches "will be available shortly," MS says)

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.