Menu
Microsoft discloses zero-day flaw, publishes quick fix

Microsoft discloses zero-day flaw, publishes quick fix

Attacks are under way using PowerPoint file, the company said

Microsoft has published a temporary fix for a new zero-day flaw that affects nearly all versions of Windows and is currently being exploited via PowerPoint.

The flaw affects all Windows releases except Windows Server 2003, the company wrote in an advisory Tuesday. It can be exploited if a user is coaxed into opening a malicious Office file containing an OLE (object linking and embedding) object. OLE can allow a user to edit a PowerPoint file from within a Word document, for example.

"At this time, we are aware of limited, targeted attacks that attempt to exploit the vulnerability through Microsoft PowerPoint," the company said.

A successful attacker would gain the same rights as a logged-in user and could put other programs on an infected computer. Microsoft said some attacks that compromise accounts without administrator rights may pose less of a risk.

The fix, which Microsoft calls the "OLE packager shim workaround," is for 32- and 64-bit versions of PowerPoint 2007, 2010 and 2013.

Microsoft said attacks could take place via email, with the attacker sending a potential victim a malicious file or by luring a person to a compromised website containing "specially crafted content."

"An attacker would have to persuade the targeted user to visit the website, typically by getting them to click a hyperlink that directs a web browser to the attacker-controlled website," Microsoft wrote.

The User Account Control feature in Windows will display a consent or elevation prompt during an attack, depending on the privileges of the user before the malicious file is run, Microsoft said. UAC is enabled by default on Vista and newer OSes.

Earlier this month, on Patch Tuesday, Microsoft released eight security bulletins, which fixed three zero-day vulnerabilities at the same time, a rare occurrence.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesMicrosoftsecurityExploits / vulnerabilities

Featured

Slideshows

Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
Show Comments