Microsoft Issues PowerPoint Security Advisory

Microsoft said it's aware only of limited, targeted attempts to exploit this vulnerability, which could allow an attacker to execute code remotely.

Thomas Claburn, Editor at Large, Enterprise Mobility

April 3, 2009

2 Min Read
Dark Reading logo in a gray background | Dark Reading

Microsoft on Thursday issued a security advisory concerning a zero-day vulnerability in Microsoft Office PowerPoint.

If a user can be convinced to open a maliciously crafted PowerPoint file -- contained in an e-mail message or via a Web site link -- the vulnerability could allow an attacker to execute code remotely.

"Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background," explain Microsoft security engineer Cristian Craioveanu and program manager Ziv Mador in a blog post.

Affected versions of Microsoft Office PowerPoint for Windows include 2000 SP3, 2002 SP3, and 2003 SP3, as well as Microsoft Office 2004 for Mac. Office 2007, the most recent Office suite, is not affected.

Microsoft said that it's aware only of limited, targeted attempts to exploit this vulnerability.

In another blog post, Microsoft Security Response Center engineers Bruce Dang and Jonathan Ness offer further information about the problem.

"The malware samples we have seen exploiting this vulnerability are the first reliable exploits we have seen in the wild that infect Office 2003 SP3 with the latest security updates," they state. "Office 2003 SP3 (released Sept 2007) had a good run being safe from the bad guys but we missed this bug while back-porting fixes found in the Office 12 fuzzing effort to Office 2003 SP3. SP3 was a massive security push that we recommend all Office 2003 customers apply (this vulnerability notwithstanding)."

Fuzzing is a software testing method that involves supplying an application with random data in an effort to make it crash or show other effects.

Dang and Ness explain that PowerPoint files in the latest XML file format are not affected. Organizations that have migrated to PPTX, PowerPoint's XML format, can disable the affected binary file format through the FileBlock registry settings provided in the security advisory.

Another alternative is to force older PowerPoint files to open in MOICE, the Microsoft Isolated Conversion Environment, a security feature that converts various Microsoft Office binary file formats into Office Open XML format.


2009 marks the 12th year that InformationWeek will be monitoring changes in security practices through our annual research survey. All who complete the survey and provide their contact information will be entered into our prize drawing for a 46-inch Sony Bravia V Series LCD flat-panel HDTV, valued at $1,800. Find out more, and take part by April 26.

About the Author

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights