![]() ![]() ![]() In shorthand that means a malicious attacker could send you a poisoned RTF file, and the simple act of you opening it in MS Word on a Windows or Mac computer could allow them to run malicious code. ![]() Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. This security update resolves a privately reported vulnerability in Microsoft Office. Microsoft has warned Windows and Mac users that they could be at risk from boobytrapped RTF files if they leave their copies of Microsoft Office unpatched: The latest batch of security bulletins issued by Microsoft, however, underline the importance of not thinking that any security advice should be written permanently in stone. DOC files, and so it was a much safer way to share information in the office. The reasoning was that Rich Text Format didn’t support the macro language that Microsoft had embedded inside. DOC files and use Rich Text Format (.RTF) files instead. In the mid-1990s, the emergence of Word macro viruses – capable of infecting both Windows PCs and Apple Macs via Word documents – it was common practice to recommend users avoid sharing. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |