BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Word Unspecified Exploit(3)

Disclosed January 25, 2007    Fully Patched

Vulnerability Description:

A remote code execution vulnerability exists within Microsoft Word 2000 which may allow for a remote attacker to execute arbitrary code under the context of the logged in user. This vulnerability requires user interaction. In a web-based scenario (e-mail, Web site), a user would still have to open a file manually, as it would not be auto-opened.
This is reported by Symantec as a different vulnerability than eEye ZDT: Word Unspecified Exploit and eEye ZDT: Word Unspecified Exploit(2).
NOTE: This information is gathered from the reference below. eEye Research is currently researching the cause of the vulnerability and will update this ZDT entry as more information becomes available.

Vendors:

Microsoft

Vulnerable Software/Devices:

Word 2000

Vulnerability Severity:

High

Exploit Availability:

N/A

BeyondTrust Prevention and Detection:

BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

Patch:
Microsoft Security Bulletin (929434)

Mitigation:

Currently there is no known mitigation for this vulnerability.

Links:

Symantec - Trojan.Mdropper.W Summary
CVE-2007-0515
First Public PoC Code Disclosure (CMD.exe Execution)

CVE(s):

None

Leave a Reply