
Users' machines can be compromised if they open a specially crafted Office file that contains the memory corruption error, according to the Secunia advisory. The exploit drops a trojan, dubbed Mdropper.Z by Symantec.
Alfred Huger, vice president of engineering in Symantec Security Response, told SCMagazineUS.com that this scenario is nothing new. Once attackers realize their discovery has been patched, they either start spreading the attack in a widespread manner or sell the exploit code to interested buyers.
Word is an attractive target, he said.
"It has a tremendously large user base," Huger said. "We normally see any user application that has a large footprint like is going to be targeted first (after Patch Tuesday)."
Symantec researchers have only received one in-the-wild attack submission from a customer, but they believe the exploit is being heavily distributed.
Users should be wary of opening files from untrusted sources, in addition to attachments from trusted sources that they were not expecting to receive.
A Microsoft spokesperson could not immediately be reached for comment.
See original article on SC Magazine US