Summary:
- These vulnerabilities affect: All current versions of Microsoft Office for Windows and Mac (specifically Word and Excel)
- How an attacker exploits them: Typically, by enticing you to open maliciously crafted Office documents
- Impact: An attacker can execute code, potentially gaining complete control of your computer
- What to do: Install the appropriate Office patches immediately, or let Windows Update do it for you.
Exposure:
Today, Microsoft released two security bulletins describing 24 vulnerabilities found in components or programs that ship with Microsoft Office for Windows and Mac — more specifically, Word and Excel. Some of the vulnerabilities also affect the viewers, Office Compatibility Packs, and File Format Converters that ship with each program. Each vulnerability affects different versions of Office to a different extent.
The 24 flaws may affect different components and applications within Office, but the end result is always the same. By enticing one of your users into downloading and opening a maliciously crafted Office document, an attacker can exploit any of these vulnerabilities to execute code on a victim’s computer, usually inheriting that user’s level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the user’s machine.
According to Microsoft’s bulletins, an attacker can exploit these flaws using two types of Office documents: Word (.doc) and Excel (.xls). So beware of all unexpected documents you receive with these file extensions.
If you’d like to learn more about each individual flaw, drill into the “Vulnerability Details” section of the security bulletins listed below:
- MS10-079: Multiple Word Code Execution Vulnerabilities, rated Important
- MS10-080: Multiple Excel Code Execution Vulnerabilities, rated Important
Solution Path
Microsoft has released patches for Office to correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.
Word update for:
- Office XP w/SP3
- Office 2003 w/SP3
- 2007 Microsoft Office System w/SP2
- Office 2010
- Office 2010 64-bit
- Office 2004 for Mac
- Office 2008 for Mac
- Open XML File Format Converter for Mac
- Microsoft Office Word Viewer
- Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
- Microsoft Office Web App
- Microsoft Word Web App
Excel update for:
- Office XP w/SP3
- Office 2003 w/SP3
- 2007 Microsoft Office System w/SP2
- Office 2004 for Mac
- Office 2008 for Mac
- Open XML File Format Converter for Mac
- Microsoft Office Excel Viewer
- Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
For All WatchGuard Users:
While you can configure certain WatchGuard Firebox models to block Word and Excel documents, some organizations need to allow them in order to conduct business. Therefore, these patches are your best recourse. Temporarily though, you may still want to block these Office documents until you are able to install Microsoft’s patches.
If you want to block Word, Excel, and Works documents, follow the links below for video instructions on using your Firebox proxy’s content blocking features to block .doc and .xls files by their file extensions:
- Firebox X Edge running 10.x
- Firebox X Core and X Peak running Fireware 10.x
Status:
Microsoft has released Office updates to fix these vulnerabilities.
References:
This alert was researched and written by Corey Nachreiner, CISSP.