The software titan released an advisory today for the flaw, warning PC users of limited zero-day attacks.
Microsoft advised caution in opening email attachments and viewing websites, saying that, to infect a PC, an attacker must first dupe a targeted user into opening a malicious Word file.
Alexandra Huft, Microsoft security program manager, said on the Microsoft Security Response Center blog today that her company is aware of "very limited, targeted" attacks attempting to use exploit the flaw.
Microsoft has been criticised for failing to distribute patches for three other Word flaws during recent Patch Tuesday releases.
Secunia, ranked the flaw as "extremely critical," meaning it can be exploited by remote code and exploits are in the wild.
The vulnerability is caused due to an unspecified error when parsing Word documents, according to the vulnerability-reporting clearinghouse. The flaw exists in Word 2000, but other versions may also be affected.
Researchers at Symantec disclosed the flaw, also saying the issue is "extremely critical."
"An attacker could exploit this issue by enticing a victim to open a malicious Word file," according to Symantec. "If the attack is successful, the attacker may be able to execute arbitrary code in the context of the currently logged-in user."
Click here to email Online Editor Frank Washkuch Jr.
Microsoft advisory warns exploits targeting newest Word vulnerability
By Frank Washkuch on Jan 26, 2007 11:28PM