Feeds

MS Office virus could infect...

18 May 1999

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

It was five years ago today... Remember when viral threats were news - as opposed to simply another stitch in life's rich tapestry? Let's face it, these days you can't even look at an email through a lead shield without running the risk of bringing down the world's entire IT infrastructure.

So, happy Russian New Year to you all:

MS Office virus could infect without you opening attachment

By John Lettice
Published Tuesday 18th May 1999 10:21 GMT

Israeli security outfit Finjan Software has warned of how a potentially serious Excel-related virus could spread and inflict damage without the recipient opening an email attachment. Finjan says that "All 3.x and 4.x versions of the Microsoft Internet Explorer Browsers and Netscape Navigator browsers 3.x and 4.x (except Navigator 4.5) are vulnerable, as well as all HTML-aware email applications such as Outlook 98."

The virus in question is Russian New Year, which uses the Excel CALL function in Office 95 and Office 97. This allows external executables to be started from within a spreadsheet cell, without the user knowing it's happening. Finjan explains how this would work via a browser: "On a Web page, Web developers include services to various file content types from a server to a browser. Suppose the files end with .XLS extensions. Then it is likely that these files will be associated with the Excel program. In this case, the .XLS files transferred to a browser will be passed immediately and processed by the referenced application - in this case, Excel.

When Excel is opened, it executes functions in the cells of the spreadsheet. If one of the functions has a maliciously coded CALL function then it is possible that the Excel spreadsheet can be used to copy an executable program to the hard disk and execute it." But that doesn't mean you have to physically open the link yourself. Vulnerable browsers and email programs can execute the CALL function automatically without the email actually being opened, therefore it seems conceivable that the infection could spread without users even noticing it was happening.

Freelance writer Deborah Radcliff reported on this a few days ago in Computerworld, and she comes up with some possible consequences. A mass mail could be used to distribute the virus, which could be used for espionage purposes (suck data from your corporate rivals) or for sheer destruction, creating and writing data to the recipients' hard disks. She also suggests the possibility that the Melissa approach, where the virus apparently comes from a colleague or friend, could be used in conjunction with Russian New Year. According to Finjan, the solutions are convoluted, and not particularly attractive for people who use the CALL function frequently.

You need to run Office 97 (there's no fix for 95) with service packs 1 and 2 installed and the Microsoft patch to disable the CALL function. If you're using IE 3.x, upgrade to 4.x and set the security level to highest. Navigator users should switch to 4.5. Our thanks to Windows 98 Central, a useful site for monitoring all things Windows-related, for drawing this one to our attention.


Windows 98? There's a blast from the past for all of you who can remember when it was all fields around here... Of course, we can all now sleep sounder in our beds thanks to the invulnerable Windows XP and all of its bomb-proof related apps... ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.