Skip to main content

Security Flaw found in MS Office 2007

Researchers have discovered a "highly critical" security flaw in newly released Office 2007, despite Microsoft's efforts to deliver its most secure version yet of the productivity software.

Despite Microsoft's efforts to lock down the update, eEye finds a hole that could let an outsider run malicious software on a PC. So what else is new? Aren't we tired of reading about MS software products are not secure, Windows Vista has security flaws within 1-month of product launch (Experts sceptical on Vista security) and then this...

The consumer version of Office 2007, which launched only four weeks ago, is designed to withstand higher scrutiny by malicious code writers, as Microsoft subjected the software to code auditors as part of its security development lifecycle.

But researchers at eEye Digital Security found a file format vulnerability in Microsoft Office Publisher 2007, which could be exploited to let an outsider run code on a compromised PC.

"We were surprised we could find a flaw so quickly (after Office 2007 launched) and one that was part of their core products," said Ross Brown, eEye's chief executive.

An attacker could create a malicious publisher file, he said. Once the recipient opens the file, he or she could find the system infected and susceptible to a remote attack.

Full story here...

Comments

Popular posts from this blog

Strategic Plan vs. Operational Plan

Strategic Plan Vs. Operational Plan: Do You Know the  5 Main Differences ? What's the difference between a Strategic Plan vs. an Operational Plan? Both are plans but are they the same? If not, what’s the difference? Do you need both? Why do we need both?  After mentoring Start-Ups from pre-revenue to achieving at least S$1M in revenues since 2012 and supporting growing Small-Medium Enterprises within the S$4M to S$10M range revenues, whose leadership teams are stuck in their day to day operational matters and fire-fighting, I hear these questions frequently.  My response: A  strategic plan  outlines your Vision, Mission, Core Values to build the Culture with high-level goals for the next 3 to 5 years. It also takes into account how you’ll measure those goals, and the major projects you’ll take on to meet them. An  operational plan  (also known as a  work plan ) is an outline of what each of your business d...

From Toilet Cleaner to CEO

On 22-April-2012, my entrepreneurship journey story was published by The Sunday Times in Singapore by Mr. Wong Kim Hoh
Howto Deploy Ethernet MAC Address Filtering on CommGate 3.x Download Notepad++ from http://notepad-plus.sourceforge.net/uk/site.htm to edit the following text files from a Windows PC. You can then convert the text files into Windows and UNIX modes easily. Using Notepad++, create a text file and save it as rc.firewall.macaddr in /etc/rc.d directory. Add all the Ethernet MAC Addresses into file /etc/rc.d/rc.firewall.macaddr (one MAC Address per line) to filter it via the firewall rules in the following format; MACADDRS="\ 11:22:33:44:55:66 \ aa:bb:cc:dd:ee:ff \ 66:55:44:33:22:11" Note: Please change the MAC addresses with your own. Using WinSCP3 (downloadable from http://winscp.net/eng/download.php ), login to the CommGate 3.x system as user root and double-click on the following file /etc/rc.d/rc.firewall.local ( Note: Save a copy of the original file for backup purposes before you edit it as a precaution). Add the customize rule...