The vulnerability cannot be exploited automatically through e-mail. For an 
attack to be successful a user must open an attachment that is sent in an 
e-mail message.

 In a Web-based attack scenario, an attacker would have to host a Web site that 
contains a Word file that is used to attempt to exploit this vulnerability. In 
addition, compromised Web sites and Web sites that accept or host user-provided 
content could contain specially crafted content that could exploit this 
vulnerability. An attacker would have no way to force users to visit a 
malicious Web site. Instead, an attacker would have to persuade them to visit 
the Web site, typically by getting them to click a link that takes them to the 
attacker's site.

Frank Muto
FSM Marketing Group, Inc.
Postini Partner Reseller

NEW Weblog - Posts on news for spam and virus information.

WISPA Wireless List:



Reply via email to