Another hole found in PowerPoint

Posted by   Virus Bulletin on   Oct 19, 2006

Proof-of-concept exploit shows further bug in slideshow software

Microsoft has issued an alert over a new potential zero-day exploit in its PowerPoint presentation software. The exploit is only a proof of concept and is as yet not thought to be in use by attackers.

The new bug comes just days after the monthly Patch Tuesday updates, one of which covered a previous hole in PowerPoint. It is believed to affect only the Office 2003 version of PowerPoint, and may result in remote code execution.

Microsoft released news of the vulnerability on its security blog. Alerts have also been issued by US-CERT and by Secunia, which has rated the problem as 'highly critical'.

Posted on 19 October 2006 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Advertisements on Blogspot sites lead to support scam

Support scam pop-ups presented through malicious advertisements show that, next to vulnerable end points, gullible users remain an easy source of money for online criminals.

To make Tor work better on the web, we need to be honest about it

Many websites put barriers in front of visitors who use the Tor network. If we want to make the web more accessible through Tor, we need to be honest about why this is done, rather than cry wolf about a dislike for privacy, Martijn Grooten says.

Paper: How It Works: Steganography Hides Malware in Image Files

A new paper by CYREN researcher Lordian Mosuela takes a close look at Gatak, or Stegoloader, a piece of malware that was discovered last year and that is controlled via malicious code embedded in a PNG image, a technique known as steganography.

Paying a malware ransom is bad, but telling people to never do it is unhelpful advice

The current ransomware plague is one of the worst threats the Internet has seen and it is unlikely to go away any time soon. But telling people to never pay the ransom is unhelpful advice.

VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers

In his VB2015 paper, Martin Korman presented his 'VolatilyBot' tool, which extracts malicious code from packed binaries, leveraging the functionality of the Volatility Framework.