Word 2002 SP3 Subject to Remote Attacks

Less than 24 hours after its Patch Tuesday release, Microsoft issued a security advisory connected to a possible vulnerability in Word 2002 Service Pack 3.

Less than 24 hours after its Patch Tuesday release, Microsoft issued a security advisory connected to a possible vulnerability in Microsoft Word 2002 Service Pack 3. The company is conducting an ongoing investigation into the problem, which isn't widespread, spokespersons say, but it isn't fixed either.

"At this time, Microsoft is aware only of limited, targeted attacks that attempt to use this vulnerability," wrote Bill Sisk, Microsoft's security response communications manager, in an e-mail statement.

The vulnerability in question is a classic remote code execution (RCE) attack class through a client-side vector. In order for a hacker to exploit this vulnerability, a user would have to open a maliciously configured Word document, allowing the attacker to gain entrance into the processing environment and perhaps the whole network to gain superuser access.

This is a common method among hackers leveraging RCE exploits since Microsoft Office documents are used quite frequently in enterprise environments all over the world.

Meanwhile, as far as this particular advisory is concerned, Sisk offered no indication or assurance that the issue would be patched anytime soon. He explained that advisory "may not require a security bulletin but could still affect a customer's overall security."

Users of other Microsoft Word versions and service packs will not be affected, according to Microsoft's investigation. Redmond ruled out other Office components too. "Microsoft Office Word, Microsoft Office Word Viewer, Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats, and Microsoft Office for Mac" all are not affected by this vulnerability.

This latest advisory, announced late Tuesday, marks the fourth off-cycle security threat advisory since June 30. Some security experts have said that Microsoft's rating system for patches and threats may be understated, and such off-cycle announcements give credence to that notion.

In the meantime, prior to Microsoft issuing a patch, Redmond recommends using the Word Viewer program that is designed to protect against such exploits upon opening a file.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.


  • Google IDs on Azure Active Directory B2B Service Now at 'General Availability'

    Microsoft announced on Wednesday that users of the Google identity and access service can use their personal log-in IDs with the Azure Active Directory B2B service to access resources as "guests."

  • Top 4 Overlooked Features of a Data Backup Strategy

    When it comes to implementing an airtight backup-and-recovery plan, these are the four must-have features that many enterprises nevertheless tend to forget.

  • Microsoft Bolsters Kubernetes with Azure Confidential Computing

    Microsoft on Tuesday announced various developments concerning the use of Kubernetes, an open source container orchestration solution fostered by Google.

  • Windows Will Have Support for Encrypted DNS

    Microsoft announced this week that the Windows operating system already has support for an encrypted Domain Name System option that promises to add greater privacy protections for Internet connections.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.