Word Mail Merge vulnerability (Patch available)
------------------------------------------------------------------------


SUMMARY

Microsoft has released a patch that eliminates a security vulnerability
in 
Microsoft Word 2000 and 97. The vulnerability allows a malicious user to 
run arbitrary code on a victim's computer without their approval by 
sending them a malicious Word document.

DETAILS

Affected Software Versions:
 - Microsoft Word 2000
 - Microsoft Word 97

If an Access database is specified as a data source via DDE in a Word
mail 
merge document, macro code can run without the user's approval when the 
document is opened.

If a user could be enticed into opening a specially constructed mail
merge 
Word document, which was provided either as an e-mail attachment or as a 
link hosted on a hostile web site, it would be possible to cause
arbitrary 
code to run on the user's machine. For such an attack to succeed, the 
victim would also need the ability to reach the Access database via a
UNC 
share or file:// protocol. If the user were behind a firewall and
security 
best practices have been followed, the ports required to access the 
database would be blocked.

Patch Availability:
 - Microsoft Word 2000:
    <http://officeupdate.microsoft.com/2000/downloadDetails/wrdacc.htm> 
http://officeupdate.microsoft.com/2000/downloadDetails/wrdacc.htm
 - Microsoft Word 97: Patch will be available shortly.


What's the scope of the vulnerability?
The vulnerability could allow a malicious user to execute code on a
user's 
machine without the user's authorization. In order to exploit this 
vulnerability, the malicious user would need to entice the user to
either 
open a Word file attachment in a malicious e-mail message or to visit a 
malicious web site that referenced a malicious Word file through html.
The 
Word document would refer in turn to an Access database used as a mail 
merge data source, and the code would be executed when the Access
database 
was opened. 
A user could only be attacked if they had the ability to open the Access 
data source specified by the malicious user. In other words, if the 
malicious Access file were referenced as a UNC path, the user would need 
to have the ability to reach that file. If a customer's computer were 
behind a firewall and security best practices had been followed, access
to 
UNC paths hosted on the Internet would normally be blocked.

What causes the vulnerability?
By design, there is no macro protection mechanism when opening an Access 
database. If Access is specified as a data source for a Word mail merge 
document, then VBA code contained within the Access database will be 
launched when the Word document is opened. 

What is VBA?
Microsoft Visual Basic for Applications (VBA) is the development 
environment and macro language that is included as part of Microsoft 
Office. It lets customers automate a wide variety of tasks within any 
Office application. The vulnerability at issue here could allow VBA code 
contained in an Access database to be executed without the user's 
knowledge when the user opened a Word mail merge document. 

What's the mail merge function in Word?
Mail merge is a feature that provides the ability to easily construct
form 
letters, mailing lists, and catalogs within Microsoft Word. Normally it
is 
used in conjunction with a database application or other external data 
management tool that allows the user to "merge" a document containing 
addresses or other personalized information into a Word mail merge 
document. 

What's wrong with the mail merge functionality in Word?
The vulnerability does not result from the mail merge function as such, 
but from the interaction of the Word mail merge function and the Access 
database that can be used as a data source, via DDE. While Word will
warn 
a user before executing VBA code contained in a Word document, a
malicious 
user could avoid the warning by creating a Word mail merge document that 
used an Access database as a data source, and then inserting VBA code in 
the Access database. 
In the case of a Word file being opened from Internet Explorer, the
Office 
Document Open Confirmation Tool will prompt the user before opening the 
Word file from within IE.

What would this vulnerability let a malicious user do?
The vulnerability could allow a malicious user to execute code on a
user's 
machine without the user's approval. In order to exploit this 
vulnerability, the malicious user would need to entice the user to
either 
open a Word file attachment in a malicious e-mail message or to visit a 
malicious web site that referenced the malicious Word file. 
If the VBA code contained within the Access database attempted to
function 
as a virus such as the ILOVEYOU virus, the Outlook E-mail Security
Update 
could prevent virus from propagating via E-mail.

Would the malicious Word or Access file need to be located on my local 
machine?
No. The malicious user could either send an e-mail attachment with the 
offending Word file or create a link to a malicious web site that
included 
an html reference to the Word file. The Word file could be located on
the 
malicious user's web site. 

How would a malicious user exploit this vulnerability?
The most likely scenario (if it were to take place) would involve a 
malicious user sending a Word document as an attachment in e-mail or 
sending an html link through mail, referencing the Word file on their 
malicious web site. The Word file would in turn reference the Access 
database as a mail merge data source. 
In the both scenarios above, the user would be taking action on an 
un-trusted file or link from an un-trusted source. Users should be
careful 
in opening attachments or referencing links from unknown sources.

If I'm behind a firewall, would that prevent an attack from succeeding?
If a user is protected by a firewall, where best security practices have 
been followed and inbound and outbound traffic has been blocked on ports 
135-139 and 445, a malicious Access database hosted on the Internet can 
not exploit this vulnerability. The Access database will not be
retrieved 
when it is specified as a mail merge data source through the file:\\ or 
UNC naming conventions. 

Where can I get information on Ports 135-139, and 445 referenced above?
 <http://www.isi.edu/in-notes/iana/assignments/port-numbers> 
http://www.isi.edu/in-notes/iana/assignments/port-numbers provides more 
information on the use of the port numbers listed above. Briefly, Ports 
135-139 and 445 are the NetBIOS ports used for accessing files on a 
Windows network. 

What machines are at greatest risk from this vulnerability?
Any computer that has Microsoft Word and Access installed and is
connected 
to a network can be affected by this vulnerability. However, the risk
from 
a malicious Word file is greater if users are directly connected to the 
Internet. Macintosh Word users are not affected by this vulnerability 
since Access is not an application that is supported on the Macintosh.

It seems that Access is the cause of the problem, why did Microsoft fix 
Word?
The vulnerability results from the fact that an executable object (the 
Access database with embedded VBA code) could be launched from a Word 
document without warning to the user. The patch makes Word's handling of 
Access as an executable document consistent with Word's handling of
other 
executable types. 

Who should use the patch?
Microsoft recommends that all users of the affected versions of
Microsoft 
Word consider installing this patch. 

What does the patch do?
The patch enforces zone checking of the Access mail merge data source 
within the Word file. A dialog will appear notifying the user that the 
mail merge data source is unavailable if the file is detected to be in
the 
Internet or Restricted sites zone. 

How do I use the patch?
Microsoft Knowledge Base articles  
<http://www.microsoft.com/technet/support/kb.asp?ID=274226> Q274226
(Word 
2000) and  <http://www.microsoft.com/technet/support/kb.asp?ID=272749> 
Q272749 (Word 97) contain detailed instructions for applying the patch. 

How can I tell if I installed the patch correctly?
Microsoft Knowledge Base articles  
<http://www.microsoft.com/technet/support/kb.asp?ID=274226> Q274226
(Word 
2000) and  <http://www.microsoft.com/technet/support/kb.asp?ID=272749> 
Q272749 (Word 97) provide a manifest of the files in the patch package. 
The easiest way to verify that you've installed the patch correctly is
to 
verify that these files are present on your computer, and have the same 
sizes and creation dates as shown in the KB article.


--
Eko Sulistiono
MIKRODATA & AntiVirus Media
Web: http://www.mikrodata.co.id/
WAP: http://www.mikrodata.co.id/wap/index.wml

This message contains no viruses. Guaranteed by AVP.


------------------------------------------------------------------------
Forum Komunikasi Penulis-Pembaca MIKRODATA (FKPPM)

Informasi : http:[EMAIL PROTECTED]
Arsip     : http://www.mail-archive.com/forum%40mikrodata.co.id/
WAP       : http://mikrodata.co.id/wap/index.wml

Milis ini menjadi kontribusi beberapa rubrik yang diasuh tim MIKRODATA.
Termasuk rubrik-rubrik yang ada di media lain.

Memakai, Menyebarluaskan, dan Memperbanyak software bajakan adalah 
tindakan kriminal.

Please check with the latest AVP update before you ask about virus:
ftp://mikrodata.co.id/avirus_&_security/AntiViral_Toolkit_Pro/avp30.zip

Kirim email ke