The vulnerability cannot be exploited automatically through e-mail. For an 
attack to be successful a user must open an attachment that is sent in an 
e-mail message.

 In a Web-based attack scenario, an attacker would have to host a Web site that 
contains a Word file that is used to attempt to exploit this vulnerability. In 
addition, compromised Web sites and Web sites that accept or host user-provided 
content could contain specially crafted content that could exploit this 
vulnerability. An attacker would have no way to force users to visit a 
malicious Web site. Instead, an attacker would have to persuade them to visit 
the Web site, typically by getting them to click a link that takes them to the 
attacker's site.

http://www.microsoft.com/technet/security/advisory/929433.mspx



Frank Muto
FSM Marketing Group, Inc.
Postini Partner Reseller
http://wispa.spam-virus.com

NEW Weblog - www.spam-virus.net Posts on news for spam and virus information.






--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to