{"id":77116,"date":"2013-11-07T18:46:29","date_gmt":"2013-11-07T13:16:29","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=77116"},"modified":"2013-11-07T18:46:29","modified_gmt":"2013-11-07T13:16:29","slug":"zero-day-vulnerability-hits-microsoft-office-temporary-patch-available","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/zero-day-vulnerability-hits-microsoft-office-temporary-patch-available\/","title":{"rendered":"Zero-day Vulnerability Hits Microsoft Office &#8211; Temporary Patch Available"},"content":{"rendered":"<p>Microsoft has issued a new security advisory against an exploit that hackers are using to target a zero-day vulnerability in Microsoft Office. A temporary \u2018Fix It\u2019 tool has been released by the company; a permanent fix is yet to be rolled out.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/microsoft_fix_it_tool.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-77117 aligncenter\" alt=\"microsoft_fix_it_tool\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/microsoft_fix_it_tool.png\" width=\"400\" height=\"400\" \/><\/a><\/p>\n<p>A pre-existing vulnerability in some versions of Microsoft office has raised fresh concerns in the IT world. This vulnerability is unknown, and is being used by hackers to launch targeted attacks against selected computers. Microsoft has stated that, it has received reports of such attacks in Middle East and South Asia.<\/p>\n<p><b>What is the Security Vulnerability<\/b>?<br \/>\nThe security vulnerability is a flaw in the way Microsoft Graphics components handle graphical images. A hacker can exploit this flaw to remotely take over the victim\u2019s computer and gain the user\u2019s current rights.<\/p>\n<p><b>Affected Versions of Microsoft Office<br \/>\n<\/b>Office 2003<br \/>\nOffice 2007<br \/>\nOffice 2010 [affected only on Windows XP and Windows Server 2003]<\/p>\n<p><b>Non-affected Versions of Microsoft Office<br \/>\n<\/b>Office 2013<b><br \/>\n<\/b><\/p>\n<p><b>Nature of Attack<br \/>\n<\/b>The attack does not occur automatically; it requires user interaction. In one scenario, the victim may receive an enticing email attachment containing the email. Opening the attachment will launch the infection. Similarly, the exploit may arrive in the guise of an email message or it may be hiding in a web page.<\/p>\n<p><b>What is the Solution?<br \/>\n<\/b>Microsoft has not yet released any permanent fix to deal with this security flaw. However, it has rolled out a temporary solution called <a href=\"https:\/\/support.microsoft.com\/kb\/2896666\" target=\"_blank\">Fix it tool<\/a>. It is strongly recommended that users whose computers lie in the risk zone, install this tool at the earliest.<\/p>\n<p><b><i>Note<\/i><\/b>: This security vulnerability also affects certain components of Microsoft Windows and Microsoft Lync. You can read the official <a href=\"https:\/\/technet.microsoft.com\/en-us\/security\/advisory\/2896666\" target=\"_blank\">security advisory<\/a> released by Microsoft on this matter.<\/p>\n<p><b>What do we suggest?<br \/>\n<\/b>As the attack requires user interaction, there are a lot of things you can do to stay safe:<\/p>\n<ol>\n<li>Do not entertain unwanted, unsolicited or unknown email messages.<\/li>\n<li>Stay particularly careful from email messages that present exciting offers and urge you to open email attachments.<\/li>\n<li>Never click a link embedded in email messages, unless you are sure about the sender.<\/li>\n<li>Keep your computer OS, software, and Internet browsers patched and up-to-date.<\/li>\n<li>Keep your computer\u2019s antivirus up-to-date.<\/li>\n<li>Consider using <a href=\"https:\/\/www.quickheal.co.in\/quick-heal-total-security-for-android\" target=\"_blank\">cloud-based email security<\/a> that blocks infected, spam and phishing emails from reaching your inbox.<\/li>\n<\/ol>\n<p>We will keep you posted if any new developments on this matter come up. And until Microsoft rolls out a permanent patch, consider using the Fix It tool, and the precautions as outlined in this post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has issued a new security advisory against an exploit that hackers are using to target a zero-day vulnerability in Microsoft Office. A temporary \u2018Fix It\u2019 tool has been released by the company; a permanent fix is yet to be rolled out. A pre-existing vulnerability in some versions of Microsoft office has raised fresh concerns [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24,75,36],"tags":[49,81,622,717,38,718],"class_list":["post-77116","post","type-post","status-publish","format-standard","hentry","category-email","category-malware","category-microsoft-windows","category-security-patch","tag-malware","tag-microsoft-office","tag-security-flaw","tag-temporary-patch","tag-vulnerability","tag-zero-day"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77116"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=77116"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77116\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=77116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=77116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=77116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}