Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Word Unspecified Exploit(3)

Disclosed January 25, 2007    Fully Patched

Vulnerability Description:

A remote code execution vulnerability exists within Microsoft Word 2000 which may allow for a remote attacker to execute arbitrary code under the context of the logged in user. This vulnerability requires user interaction. In a web-based scenario (e-mail, Web site), a user would still have to open a file manually, as it would not be auto-opened.
This is reported by Symantec as a different vulnerability than eEye ZDT: Word Unspecified Exploit and eEye ZDT: Word Unspecified Exploit(2).
NOTE: This information is gathered from the reference below. eEye Research is currently researching the cause of the vulnerability and will update this ZDT entry as more information becomes available.



Vulnerable Software/Devices:

Word 2000

Vulnerability Severity:


Exploit Availability:


BeyondTrust Prevention and Detection:

BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

Microsoft Security Bulletin (929434)


Currently there is no known mitigation for this vulnerability.


Symantec - Trojan.Mdropper.W Summary
First Public PoC Code Disclosure (CMD.exe Execution)



Leave a Reply