Attackers exploit unpatched Excel vulnerability

Microsoft confirms critical bug as attacks target Asian gov't offices, corporations

For the second time in the last five days, security researchers are warning that hackers are exploiting a critical unpatched vulnerability in widely-used software.

Attackers are exploiting a "zero-day," or unfixed, flaw in Microsoft's popular Excel spreadsheet, using the bug to hijack select systems in Asia, many of them in government offices and high-profile corporations, said Vincent Weafer, vice president of Symantec's security response group.

Hackers have been using another unpatched vulnerability in Adobe Reader for several weeks in a similar fashion, although now that the exploit code has gone public, experts expect to see attacks quickly increase.

The newest vulnerability, which is in all supported versions of Excel, including the latest -- Excel in Office 2007 on Windows and in Office 2008 for Mac -- is in the program's file format, said Weafer.

"This is very similar to the Adobe [Reader] vulnerability we found earlier in that it's being used as a targeted threat," said Weafer. He said Symantec's researchers first came across attack code Monday, and reported their findings to Microsoft the same day.

Tuesday, Microsoft issued a security advisory with more information about the bug, typically a first step towards releasing a patch when a vulnerability goes public.

Microsoft spokesman Bill Sisk downplayed the threat to most users, repeating Weafer's comment that attacks have been seen in only limited numbers. But he promised that the company would patch the problem. "Microsoft is currently working to develop a security update for Microsoft Office that addresses this vulnerability and will release it after it has completed testing," he said in an e-mail.

According to Microsoft's advisory, Excel 2000, 2002, 2003 and 2007 on Windows, and Excel 2004 and 2008 on the Mac OS X, are affected by the vulnerability.

Until a patch is produced, Microsoft said users could protect themselves by blocking Excel files from opening, a process that requires editing the Windows registry, normally a chore beyond most users. Alternately, users can run Excel 2003 documents through the Microsoft Office Isolated Conversion Environment (MOICE), a tool the company launched in 2007 that converts those files into the more secure Office 2007 formats to strip out possible exploit code.

Join the newsletter!

Error: Please check your email address.

Tags security patchbug

More about Adobe SystemsBillExcelMicrosoftSymantec

Show Comments

Market Place

[]