Attack posted for Office conversion tool fixed last week
A security researcher has posted code for an exploit targeting a component of Microsoft Office.
The vulnerability lies in a conversion tool used to convert Microsoft Works WPS files into Word RTF files The flaw could allow an attacker to remotely execute code on a user's system.
Microsoft repaired the vulnerability as part of its monthly security release on 12 February.
When the update was released Microsoft credited discovery of the flaw to iDefense, which in turn credited security researcher Damian Put.
Two days after the patch was released, a user by the name of 'chujwamwdupe' posted the sample exploit code to security site milw0rm.
The US Computer Emergency Response Team urged users to protect against the vulnerability by installing Microsoft's most recent security update.
A security researcher has posted code for an exploit targeting a component of Microsoft Office.
The vulnerability lies in a conversion tool used to convert Microsoft Works WPS files into Word RTF files The flaw could allow an attacker to remotely execute code on a user's system.
Microsoft repaired the vulnerability as part of its monthly security release on 12 February.
When the update was released Microsoft credited discovery of the flaw to iDefense, which in turn credited security researcher Damian Put.
Two days after the patch was released, a user by the name of 'chujwamwdupe' posted the sample exploit code to security site milw0rm.
The US Computer Emergency Response Team urged users to protect against the vulnerability by installing Microsoft's most recent security update.
0 comments:
Post a Comment Subscribe to Post Comments (Atom)