What a busy day! Microsoft just released an advisory with details about a new vulnerability in Word, which is currently being exploited in targeted attacks.
Earlier today, we found a mention of such a vulnerability in an advisory published by Symantec. Symantec published this advisory based on a sample our handler Maarten sent to our malware distribution list. The file in question was actually part of a bundle of files he sent. As far as we know, this is the only sample we had which exploits this vulnerability.
Please read the Microsoft advisory carefully. According to Microsoft's testing, it only affects Microsoft Office Word 2002 Service Pack 3. This is one reason we didn't consider this particular sample as we didn't test it with this particular version of Office.
Needless to say, this is yet another reminder that exploits like this are likely to continue in targeted attacks. Feel free to send us suspect samples. Luckily, there is some anti-virus coverage in this particular case.
The md5 hash of the particular sample we have: 0x7C0812F6207FF8E9FEF016DE48786168 (attachement.doc). Excerpt from Virustotal:
F-Secure 7.60.13501.0 2008.07.03 Trojan-Dropper.MSWord.Agent.cq GData 2.0.7306.1023 2008.07.07 Trojan-Dropper.MSWord.Agent.cq Kaspersky 18.104.22.168 2008.07.07 Trojan-Dr Sophos 4.31.0 2008.07.07 Troj/MalDoc-Fam Webwasher-Gateway 6.6.2 2008.07.07 Exploit.Win32.Ginwui.gen!MS-Word (suspicious)
Microsoft Advisory: www.microsoft.com/technet/security/advisory/953635.mspx
I will be teaching next: Defending Web Applications Security Essentials - SANS Cyber Defense Initiative 2020
Jul 9th 2008
|Thread locked Subscribe||
Jul 9th 2008
1 decade ago
Having dabbled in Md5 hash encryption a few years ago, is it my understanding that one phrase = one hash? So if a phrase is created then a hash will ultimately be created too?
Check in with me here - http://www.intoforward.com
Apr 9th 2016
4 years ago