Rigged Word docs exploit 2008 bug, say researchers

23.04.2009
Attackers, probably based in China, are exploiting a December bug in Microsoft Word to hijack Windows PCs, Vietnamese security researchers warned Thursday.

According to Nguyen Minh Duc, manager of Hanoi-based Bach Khoa Internetwork Security's (BKIS) application security department, rigged Word documents have begun to circulate as e-mail attachments. The malformed .doc files exploit one of the eight Word flaws fixed by Microsoft in December 2008 as part of the company's .

The holes in Word 2000, 2003 and 2007 for Windows, and Word 2004 and 2008 for the Mac were plugged by the update.

When a malicious Word document is opened, the attack code executes successfully on machines with an unpatched copy of Word 2003. "If other Word versions are used in the computer, they are only crashed without any malicious code execution," Nguyen said in an e-mail. The malware drops a Trojan keylogger on the compromised computer to steal information, such as usernames and passwords.

BKIS suspected Chinese hackers were behind the exploit. "It is connected to a server with the domain name '8800.org' registered in China to receive commands," Nguyen said. "In the malicious e-mail, we also found charset="gb2312, [which] is Chinese charset."

Attacks exploiting vulnerabilities in Microsoft's Office applications are common. In February, Microsoft's security team acknowledged hackers were , then earlier this month issued a , the suite's presentation maker.

Microsoft patched the Excel bug last week as part of its .

Support for Word 2003, the version BKIS said is vulnerable to the new attack, last week. Microsoft will continue to provide security updates for the application until April 8, 2014, but will no longer offer free non-security fixes.