Severity: High Summary: These vulnerabilities affect: Word (and Office) 2003 through 2010 for Windows (and related components) How an attacker exploits it: By enticing one of your users to open a malicious RTF document Impact: In the worst case, an attacker executes code on your user's computer, gaining complete control of it What to do: Install Microsoft's Word update as … [Read more...]
Four Critical Spreadsheet Handling Flaws in Excel
Severity: Medium Summary: These vulnerabilities affect: Excel (and Office) 2003 through 2010 for Mac and PC (and related components) How an attacker exploits it: By enticing one of your users to open a malicious Excel document Impact: In the worst case, an attacker executes code on your user's computer, gaining complete control of it What to do: Install Microsoft's Excel … [Read more...]
Microsoft Black Tuesday: Critical Updates Affect Windows 8 and More
It's Microsoft Patch Day and I have a question for you. How quick are you at applying software updates? Do you jump on them within the day; a week, or are you months behind? If you are one of the many who fall behind, know that patching is one of the practices that can most improve your security posture. I recommend you take this opportunity to improve your patching practices … [Read more...]
Word, Visio, and Excel Suffer from Document Handling Vulnerabilities
Severity: High Summary: These vulnerabilities affect: Most current versions of Microsoft Office for Windows and Mac, and related products like Visio Viewer and the Office Compatibility Packs How an attacker exploits them: Typically, by enticing you to open maliciously crafted Office documents Impact: An attacker can execute code, potentially gaining complete control of your … [Read more...]
Five Office Updates Primarily Patch Document Handling Vulnerabilities
Summary: These vulnerabilities affect: Most current versions of Microsoft Office for Windows and Mac, and related products like Publisher How an attacker exploits them: Typically, by enticing you to open maliciously crafted Office documents Impact: An attacker can execute code, potentially gaining complete control of your computer What to do: Install the appropriate Office … [Read more...]