Home Security McAfee jumps the gun on Microsoft Word zero-day

McAfee jumps the gun on Microsoft Word zero-day

McAfee jumps the gun on Microsoft Word zero-day Featured

McAfee Security has jumped the gun on disclosure of a zero-day vulnerability in Microsoft Word that the security company FireEye was discussing with Microsoft and awaiting release of a patch before divulging details.

The McAfee blog carried details of the bug on Friday.

Thereafter, FireEye posted details itself on 8 April, saying: "FireEye shared the details of the vulnerability with Microsoft and has been co-ordinating for several weeks public disclosure timed with the release of a patch by Microsoft to address the vulnerability.

"After recent public disclosure by another company, this blog serves to acknowledge FireEye’s awareness and coverage of these attacks."

The bug in question allows a malicious Word document containing an OLE2link object to be executed by a system running even Windows 10. On execution, a malicious .hta file is fetched from a command server and run on the machine in question.

FireEye said: "In both observed documents the malicious script terminated the winword.exe process, downloaded additional payload(s), and loaded a decoy document for the user to see. The original winword.exe process is terminated in order to hide a user prompt generated by the OLE2link."

McAfee said in its post of 7 April that "the samples we have detected are organised as Word files (more specially, RTF files with '.doc' extension name).

"The exploit works on all Microsoft Office versions, including the latest Office 2016 running on Windows 10. The earliest attack we have seen dates to late January."

McAfee wants privacy block disabled.

As can be seen from the screenshot embedded above, the Intel-owned McAfee''s blog post requires privacy protection to be disabled in order that a user can read the Web page.

Microsoft is due to release its next batch of security updates on Tuesday, 11 April, US time.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications