Exploit code targets Microsoft flaw

By

A security researcher has posted code for an exploit targeting a component of Microsoft Office..


The vulnerability lies in a conversion tool used to convert Microsoft Works WPS files into Word RTF files The flaw could allow an attacker to remotely execute code on a user's system.

Microsoft repaired the vulnerability as part of its http://www.securecomputing.net.au/news/microsoft-releases-11-patches-for-17-vulnerabilities-six-critical.aspx" target="_blank">monthly security release on 12 February.

When the update was released Microsoft credited discovery of the flaw to iDefense, which in turn credited security researcher Damian Put.

Two days after the patch was released, a user by the name of 'chujwamwdupe' posted the sample exploit code to security site milw0rm.

The US Computer Emergency Response Teama urged users to protect against the vulnerability by installing Microsoft's most recent security update.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

Qantas obtains court order to prevent third-party access to stolen data

Qantas obtains court order to prevent third-party access to stolen data

Cloudflare makes changes to avoid repeat of 1.1.1.1 DNS outage

Cloudflare makes changes to avoid repeat of 1.1.1.1 DNS outage

ACSC alerts to exploited MS SharePoint remote code execution flaw

ACSC alerts to exploited MS SharePoint remote code execution flaw

Microsoft knew of SharePoint security flaw in May, initial patch ineffective

Microsoft knew of SharePoint security flaw in May, initial patch ineffective

Log In

  |  Forgot your password?