{"id":73040,"date":"2008-07-09T08:28:20","date_gmt":"2008-07-09T08:28:20","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=73040"},"modified":"2008-07-09T08:28:20","modified_gmt":"2008-07-09T08:28:20","slug":"word-flaw-exploited-by-trojan","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/word-flaw-exploited-by-trojan\/","title":{"rendered":"Word flaw exploited by Trojan"},"content":{"rendered":"<p>Microsoft warns that an unpatched Word vulnerability has become the subject of targeted attacks.According to Microsoft&#8217;s testing, it only affects Microsoft Office Word 2002 Service Pack 3. Using the vulnerability a hacker can inject hostile code onto vulnerable system.<\/p>\n<p>Redmond has published workarounds as a stop-gap measure while its researchers investigate the flaw in greater depth. The vulnerability has appeared in a number of samples on malware.<\/p>\n<p>The timing of the arrival of the exploit means Microsoft had insufficient time to respond before its regular Patch Tuesday update, a factor that&#8217;s unlikely to be a coincidence. The ins and out of the flaw are still under investigation and will probably be withheld until a fix is unavailable. It&#8217;s also unclear who the attack is targeting, though historically unpatched Word exploits are a particular favorite of Chinese hackers.<\/p>\n<p>For more details and workarounds visit <a title=\"Microsoft Security Advisory (953635)\" href=\"https:\/\/www.microsoft.com\/technet\/security\/advisory\/953635.mspx\">Microsoft Security Advisory (953635)<\/a><\/p>\n<h3><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft warns that an unpatched Word vulnerability has become the subject of targeted attacks.According to Microsoft&#8217;s testing, it only affects Microsoft Office Word 2002 Service Pack 3. Using the vulnerability a hacker can inject hostile code onto vulnerable system. Redmond has published workarounds as a stop-gap measure while its researchers investigate the flaw in greater [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-73040","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/73040"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=73040"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/73040\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=73040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=73040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=73040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}