Exploit code for Microsoft Works flaw available: US-CERT

Share this article:

The United States Computer Emergency Readiness Team (US-CERT) has warned that exploit code is publicly available for a critical MS08-011 vulnerability that affects the Microsoft Works 6 file converter.

An attacker could execute code remotely on an affected system by convincing the user to open a specially crafted Works file with an affected version of Microsoft Office, Microsoft Works or Microsoft Works Suite.

According to Microsoft, an attacker who successfully exploited this vulnerability could take complete control of an affected system and install programs; view, change or delete data; or create new accounts with full user rights, according to Microsoft.

The Microsoft Works file converter is a set of utilities that allows Microsoft Office applications to open, edit and save files in the Works file format (.wps) supported by Works versions 6, 7, 8 and 9. The vulnerability affects Microsoft Office 2003, Microsoft Works 8.0 and Microsoft Works Suite 2005, according to Microsoft, which issued a technet security bulletin regarding the flaw.

Microsoft provided a patch for this vulnerability in its February round of Patch Tuesday fixes, calling the bug "important."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Florida Supreme Court rules warrants a must for real-time cell location tracking

Florida Supreme Court rules warrants a must for ...

The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger ...

The modular malware was named "Ventir," by researchers at Kaspersky.

Fake Dropbox login page nabs credentials, is hosted on Dropbox

Fake Dropbox login page nabs credentials, is hosted ...

Symantec researchers received a phishing email linking recipients to a fake Dropbox login page that is hosted on Dropbox's user content domain and served over SSL.