Search: Home Bugtraq Vulnerabilities Mailing Lists Jobs Tools Beta Programs
    Digg this story   Add to  
Targeted attacks using PowerPoint 0-day
Published: 2006-07-14

A limited attack attempted to compromise systems using a previously unknown flaw in PowerPoint, Microsoft and others said on Friday.

The attack, dubbed Trojan.PPDropper.B by security firm Symantec, is contained in a Chinese PowerPoint file. The remote code execution vulnerability is currently being investigated by Microsoft.

"Microsoft is aware of extremely limited, targeted attacks exploiting this vulnerability," the company said in a statement sent to SecurityFocus. "In order for this attack to be carried out, a user must first open a malicious PowerPoint document that is sent as an email attachment, posted to a website or otherwise provided to them by an attacker."

Microsoft added that more recent versions of PowerPoint will issue a warning if the attachment is opened from e-mail. SecurityFocus is owned by Symantec.

The PowerPoint attack marks the third time in two months that a previously unknown, or zero-day, exploit has been used to compromise corporate systems running Microsoft Office. Last month, security firms reported that a previously unknown flaw in Excel had been used by attackers to compromise a limited number of systems. And, in May, some companies discovered a malicious program using a flaw in Word to compromise systems.

The exploits appear to be related to a string of targeted Trojan horse attacks that come from systems in China. A year ago, the national computer emergency response teams in the United Kingdom, Canada and Australia all warned of targeted attacks hitting organizations in those countries. While the U.S. organization, US-CERT, did not issue an alert, antivirus companies acknowledged that low-volume e-mail attacks had targeted U.S. companies and government agencies.

Posted by: Robert Lemos
    Digg this story   Add to  
Comments Mode:
Targeted attacks using PowerPoint 0-day 2006-07-15
Juha-Matti Laurio


Privacy Statement
Copyright 2009, SecurityFocus