Feeds

MS Office virus could infect...

18 May 1999

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

It was five years ago today... Remember when viral threats were news - as opposed to simply another stitch in life's rich tapestry? Let's face it, these days you can't even look at an email through a lead shield without running the risk of bringing down the world's entire IT infrastructure.

So, happy Russian New Year to you all:

MS Office virus could infect without you opening attachment

By John Lettice
Published Tuesday 18th May 1999 10:21 GMT

Israeli security outfit Finjan Software has warned of how a potentially serious Excel-related virus could spread and inflict damage without the recipient opening an email attachment. Finjan says that "All 3.x and 4.x versions of the Microsoft Internet Explorer Browsers and Netscape Navigator browsers 3.x and 4.x (except Navigator 4.5) are vulnerable, as well as all HTML-aware email applications such as Outlook 98."

The virus in question is Russian New Year, which uses the Excel CALL function in Office 95 and Office 97. This allows external executables to be started from within a spreadsheet cell, without the user knowing it's happening. Finjan explains how this would work via a browser: "On a Web page, Web developers include services to various file content types from a server to a browser. Suppose the files end with .XLS extensions. Then it is likely that these files will be associated with the Excel program. In this case, the .XLS files transferred to a browser will be passed immediately and processed by the referenced application - in this case, Excel.

When Excel is opened, it executes functions in the cells of the spreadsheet. If one of the functions has a maliciously coded CALL function then it is possible that the Excel spreadsheet can be used to copy an executable program to the hard disk and execute it." But that doesn't mean you have to physically open the link yourself. Vulnerable browsers and email programs can execute the CALL function automatically without the email actually being opened, therefore it seems conceivable that the infection could spread without users even noticing it was happening.

Freelance writer Deborah Radcliff reported on this a few days ago in Computerworld, and she comes up with some possible consequences. A mass mail could be used to distribute the virus, which could be used for espionage purposes (suck data from your corporate rivals) or for sheer destruction, creating and writing data to the recipients' hard disks. She also suggests the possibility that the Melissa approach, where the virus apparently comes from a colleague or friend, could be used in conjunction with Russian New Year. According to Finjan, the solutions are convoluted, and not particularly attractive for people who use the CALL function frequently.

You need to run Office 97 (there's no fix for 95) with service packs 1 and 2 installed and the Microsoft patch to disable the CALL function. If you're using IE 3.x, upgrade to 4.x and set the security level to highest. Navigator users should switch to 4.5. Our thanks to Windows 98 Central, a useful site for monitoring all things Windows-related, for drawing this one to our attention.


Windows 98? There's a blast from the past for all of you who can remember when it was all fields around here... Of course, we can all now sleep sounder in our beds thanks to the invulnerable Windows XP and all of its bomb-proof related apps... ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?