Another zero-day vulnerability is threatening the Microsoft world, the news was issued by Microsoft through an official security advisory (CVE-2014-1761). The vulnerability is present in Microsoft Word product, it allows a remote code execution that can be exploited by attackers using a specially crafted Rich Text Format (RTF) document. Such kind of vulnerabilities are essential components for targeted attacks like spear-phishing offensives, the specific zero-day flaw is being actively exploited in wild.
“Microsoft is aware of a vulnerability affecting supported versions of Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. ”
The advisory publicly refers the support from received by Drew Hintz, Shane Huntley, and Matty Pellegrino of the Google Security Team for reporting the Word RTF Memory Corruption zero-day Vulnerability.
“At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010…” company said.
According to Microsoft’s security advisory, Microsoft Word is vulnerable to a remote code execution vulnerability (CVE-2014-1761) that can be exploited by a specially crafted Rich Text Format (RTF). An Attacker can simply infect the victim’s system with malware if a user opens a malicious Rich Text Format (RTF), or merely preview the message in Microsoft Outlook.
“The issue is caused when Microsoft Word parses specially crafted RTF-formatted data causing system memory to become corrupted in such a way that an attacker could execute arbitrary code.“
The official patch will be released by Microsoft with next security updates on April 8th, waiting for that that date, follow the mitigation factors proposed by Microsoft:
(Security Affairs – Zero-day, Microsoft)