Zero day vulnerability in Microsoft Office Web Components discovered

Filed Under: Microsoft, Vulnerability

Microsoft Office Web Components
Microsoft has published an advisory about a serious security vulnerability in its Office Web Components (OWC) software that could allow an attacker to run malicious code on your computer.

Microsoft says it has seen a limited number of attacks exploiting the vulnerability, which specifically lies in the Spreadsheet ActiveX control which can be embedded into webpages.

Affected products include (take a deep breath!) Microsoft Office XP Service Pack 3, Microsoft Office 2003 Service Pack 3, Microsoft Office XP Web Components Service Pack 3, Microsoft Office 2003 Web Components Service Pack 3, Microsoft Office 2003 Web Components for the 2007 Microsoft Office system Service Pack 1, Microsoft Internet Security and Acceleration Server 2004 Standard Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2006, Internet Security and Acceleration Server 2006 Supportability Update, Microsoft Internet Security and Acceleration Server 2006 Service Pack 1, and Microsoft Office Small Business Accounting 2006. (Phew!)

So far, there is no patch available from Microsoft to fix the problem, but Sophos customers can be reassured that we have added detection of the exploit as Exp/OWCref-A.

Microsoft has produced a workaround which involves stopping the Office Web Components library from running in Internet Explorer. You can read their detailed instructions on how to "kill" OWC on their Security Research & Defense blog.

But if the thought of fiddling with the Registry brings you out in hives, you might prefer to try their "Fix It" button instead which will run the workaround.

News of this latest zero day vulnerability couldn't have bubbled up at a worse time for Microsoft. Their latest bundle of patches are due to be released tomorrow, meaning they almost certainly won't be able to include a fix for this security hole in this round of fixes.

Further reading: Vanja in our labs has posted a blog entry with more information about this vulnerability.

,

You might like

About the author

Graham Cluley runs his own award-winning computer security blog, and is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Send Graham an email, subscribe to his updates on Facebook, follow him on Twitter and App.net, and circle him on Google Plus for regular updates.