Zero-day Vulnerability Hits Microsoft Office – Temporary Patch Available

[Sassy_Social_Share type="standard" total_shares="ON" url="https://blogs.quickheal.com/zero-day-vulnerability-hits-microsoft-office-temporary-patch-available/" style="float:left;margin:0 5px 16px;"]

Microsoft has issued a new security advisory against an exploit that hackers are using to target a zero-day vulnerability in Microsoft Office. A temporary ‘Fix It’ tool has been released by the company; a permanent fix is yet to be rolled out.

microsoft_fix_it_tool

A pre-existing vulnerability in some versions of Microsoft office has raised fresh concerns in the IT world. This vulnerability is unknown, and is being used by hackers to launch targeted attacks against selected computers. Microsoft has stated that, it has received reports of such attacks in Middle East and South Asia.

What is the Security Vulnerability?
The security vulnerability is a flaw in the way Microsoft Graphics components handle graphical images. A hacker can exploit this flaw to remotely take over the victim’s computer and gain the user’s current rights.

Affected Versions of Microsoft Office
Office 2003
Office 2007
Office 2010 [affected only on Windows XP and Windows Server 2003]

Non-affected Versions of Microsoft Office
Office 2013

Nature of Attack
The attack does not occur automatically; it requires user interaction. In one scenario, the victim may receive an enticing email attachment containing the email. Opening the attachment will launch the infection. Similarly, the exploit may arrive in the guise of an email message or it may be hiding in a web page.

What is the Solution?
Microsoft has not yet released any permanent fix to deal with this security flaw. However, it has rolled out a temporary solution called Fix it tool. It is strongly recommended that users whose computers lie in the risk zone, install this tool at the earliest.

Note: This security vulnerability also affects certain components of Microsoft Windows and Microsoft Lync. You can read the official security advisory released by Microsoft on this matter.

What do we suggest?
As the attack requires user interaction, there are a lot of things you can do to stay safe:

  1. Do not entertain unwanted, unsolicited or unknown email messages.
  2. Stay particularly careful from email messages that present exciting offers and urge you to open email attachments.
  3. Never click a link embedded in email messages, unless you are sure about the sender.
  4. Keep your computer OS, software, and Internet browsers patched and up-to-date.
  5. Keep your computer’s antivirus up-to-date.
  6. Consider using cloud-based email security that blocks infected, spam and phishing emails from reaching your inbox.

We will keep you posted if any new developments on this matter come up. And until Microsoft rolls out a permanent patch, consider using the Fix It tool, and the precautions as outlined in this post.

Rajiv Singha


2 Comments

Your email address will not be published.

  1. valand gautamkumar manubhaiJuly 20, 2015 at 5:40 PM

    anti vayaras abhi bandh kyu he

    Reply
    • Rajiv SinghaJuly 22, 2015 at 11:15 AM

      Hi Valand,

      Our Support Team can help you solve this issue:
      1. You can submit your query at https://bit.ly/Askus. The Team will get back to you with a solution.
      2. You can also contact them at 0-927-22-33-000.
      3. Alternatively, you can chat with our engineers by visiting this link >> https://bit.ly/QHSupport >> Chat with Us

      Regards,

      Reply