Microsoft: Word zero-day patch by June

The Word XP and Word 2003 hole is already being linked to targeted Internet attacks on government agencies in the U.S. and the E.U.

Microsoft plans to patch a newly discovered hole in Microsoft Word in its next monthly patch update, and may release a rare "out of cycle" patch to address the hole, a company spokesman said.

Microsoft's Security Research Center is analyzing the previously unknown vulnerability, which affects Microsoft Word XP and Word 2003 and is already being linked to targeted Internet attacks on government agencies in the U.S. and European Union, as well as U.S. government defense contractors, according to security experts. The attacks, which use Word attachments to very targeted "phishing" e-mail messages, are being likened to a widespread attack on the U.S. government last year that was code named "Titan Rain"

Anti-virus firms warned of the unknown Word hole on Friday, after attacks were first detected. When a malicious Word document is opened, an exploit file installs a Trojan horse program on the affected Windows system with a rootkit component that makes the malicious program almost undetectable. According to research by F-Secure of Helsinki, Finland, the Trojan communicates with a host registered at 3322.org, a free hosting service based in China.

Microsoft is completing development of a security update for Microsoft Word that addresses the vulnerability. The fix is being tested and could be released on June 13, with the company's scheduled monthly patch release, or sooner, according to an e-mail sent from a Microsoft spokesman to InfoWorld.

The attacks, or others like them, have been going on for months, and combine malicious Word attachments with e-mail messages that are targeted at individual users within government agencies and corporations, said Johannes Ullrich, CTO at the SANS Internet Storm Center.

Sometimes referred to as "spear phishing" attacks, the e-mail-borne threats are sent from outside an organization but made to appear as if they come from within the company. Because the e-mail attacks are sent to one or two specific users, they are very hard to spot using automated tools, and often use the names of actual employees within an organization and other tricks to deceive recipients into opening the malicious attachments, Ullrich said.

Previous attacks have also buried attacks in Word documents, which are commonly sent between employees and businesses, and rarely blocked at the network gateway. Often those attacks used known vulnerabilities in Word, but were repackaged in ways that fooled anti-virus scanners, Ullrich said.

The latest attacks are similar to an earlier, coordinated attack on U.S. government computer systems that has been dubbed "Titan Rain," which were also believed to have originated in China, Ullrich said.

In a blog posting for the MSRC, Security Program Manager Stephen Toulouse said the attacks are not widespread, and recommended reducing the privileges attached to Windows user accounts, a policy known as "least user privilege," to stop the malicious code from being installed on Windows machines.

Microsoft customers who believe they have been affected by attackers using the Word vulnerability should contact the company's Product Support Services at 1-866-PCSAFETY or visit the company's security Web site:.

Mobile Security Insider: iOS vs. Android vs. BlackBerry vs. Windows Phone
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies