Unpatched bug affects Office and Visual Studio software
August 23, 2005
Some security researchers have reported that an unpatched bug in a file installed with Microsoft's Office and Visual Studio software would cause some serious problems for Internet Explorer users. A potential hacker could gain control of a vulnerable computer by exploiting the bug, which the FR-SIRT (French Security Incident Response Team) reported in an alert published last week.
This would be achieved by installing malicious code in a Web page that exploits a memory corruption error in a file that ships with Microsoft Office 2002 and Microsoft Visual Studio .Net 2002 products, the research organization said.
Though the attack would be executed via the popular Internet Explorer (IE) browser, only systems that contain the file in question, called Msdds.dll, are vulnerable, FrSIRT said. The FrSIRT said it has not yet seen a patch for the vulnerability.
Msdds.dll is software that is used for creating customized Office applications, according to Russ Cooper, senior information security analyst for Cybertrust Inc.
Cooper does not believe that this file has been installed on a large number of Windows systems. "I'm not concerned about it," he said via instant message. "I don't doubt it is shipped with the full Office Professional installation CD, but I highly doubt it is installed automatically."
Neither Microsoft nor FrSIRT could say whether this file was installed by default with Office or Visual Studio.
Microsoft has yet to see any attackers taking advantage of the flaw, a Microsoft spokeswoman said Thursday. But reports are circulating of Web sites that take advantage of another Internet Explorer bug, which Microsoft patched on Aug. 9.
About a dozen Web sites have cropped up that take advantage of a flaw in IE's JPEG rendering engine, according to Dan Hubbard, senior director of security and research with Websense Inc.
If unpatched IE users go to these Web sites, their systems could be made to crash, or they could be made to run software that allows an attacker to gain control of the system, he said.
Because users must first be tricked into clicking on the malicious Web site for the attack to work, this exploit is not considered as dangerous as the recent round of Windows Plug and Play worms that were widely reported earlier this week.
But attackers are increasingly using Internet Explorer rather than e-mail viruses as a way of seizing control of systems, Hubbard said. "In the last year we've seen a huge trend toward malicious Web sites being used as an attack vector," he said. "E-mail is just not as effective as it used to be."
The Microsoft spokeswoman would not say whether or not a patch is planned for the Msdds.dll bug, but on Thursday the company published a security advisory discussing the problem.
Source: IT World Canada
Become an authorized reseller of Proxy Sentinel™ and Firewall Sentinel™. Do like the rest of our authorized resellers and have your clients benefit the important security features of our products and solutions, while increasing your sales at the same time. Click here for all the details.
You can link to the
Internet Security web site as
much as you like. Read our section on how your company can participate in our
reciprocal link exchange program
and increase your rankings
in the major search engines such as
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing