![]() ![]() Microsoft had also announced that they ".are aware of limited, targeted attacks directed at Microsoft Word 2010." They have not announced when a fix will be released for the vulnerability or if it will be on a regularly-scheduled Patch Tuesday or "out of band". All versions of Microsoft Word are vulnerable to the attack. The vulnerability is a remote code execution vulnerability which allows an attacker to gain control of the system when a user opens a malicious RTF file in Microsoft Word. Accordingly it can be used as a safe workaround for reading and editing RTF documents. To indicate that Windows WordPad is not vulnerable to the same issue. Microsoft has updated their recent security advisory for Microsoft Word ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |