-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

           ESB-2001.250 -- Microsoft Security Bulletin MS01-034
      Malformed Word Document Could Enable Macro to Run Automatically
                               25 June 2001

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Word 2002
                        Word 2000
                        Word 97
Vendor:                 Microsoft
Operating System:       Windows
Impact:                 Execute Arbitrary Code/Commands

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------
Title:      Malformed Word Document Could Enable Macro to 
            Run Automatically
Date:       21 June 2001
Software:   Word
Impact:     Run macro without warning
Bulletin:   MS01-034

Microsoft encourages customers to review the Security Bulletin at: 
http://www.microsoft.com/technet/security/bulletin/MS01-034.asp.
- - ----------------------------------------------------------------------

Issue:
======
Word, like other members of the Office product family, provides a 
security mechanism that requires the user's approval to run macros.
By 
design, any time a document is opened Word scans it for macros. If
any 
are found, they are handled in accordance with user's selected
security 
settings. By default in Word 2000 and 2002, only macros that are
signed 
by a trusted party are enabled; all others are disabled. In Word 97,
if 
the document contains macros, the user is prompted regarding whether
to 
enable them or disable them. 

A vulnerability results because it is possible to modify a Word 
document in such a way as to prevent the security scanner from 
recognizing an embedded macro while still allowing it to execute. 
Exploiting the vulnerability would enable an attacker to cause a
macro 
to run automatically when such a document was opened. Such a macro 
would be able to take any action that the user herself could take.
This 
could include disabling the user's Word security settings so that 
subsequently-opened Word documents would no longer be checked for 
macros. 

Mitigating Factors:
====================
 - The vulnerability only affects Word. Other Office products
   are not affected. 
 - Customers using the Outlook E-mail Security Update 
   (which is included as part of Word 2002) will be protected 
   from any worm viruses contained in Word documents. 

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletin
   http://www.microsoft.com/technet/security/bulletin/ms01-034.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - Steven McLeod (stevenmcleod@hotmail.com)

- - ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED 
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL 
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL 
MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES 
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS 
OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. 
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT 
APPLY.



- -----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOzKBXo0ZSRQxA/UrAQHJqwf/dH6cWBpYm80nCxxD1ZL1b4kbhC2dHmar
use6H2uxX7BCPZ3z/3tGCpFBGm4MZRhZtQEE8xdMFUV/g7S5T0h4IZb5pOVP46Zx
w8ODksZ0KshkbaXuOpfAd7W4PpH9tiWZaQqH20VQGh4NMwV5DC3t0TwXatKzVwcq
/iUOFFVllzYCEVCMlR5B/YCjLmwkLQiK3Q4T8JHPsoPd/pm2JVwP+DsFq3WjP78P
Hd/Mukk3rxcnRI4Yxqb6BeEWhRxkdtNP7G7u8k5O1uXx1tcopgTtAGT766FvFWyu
bzESIl+ee735/rxrO4lzwoXj83uQ/ViuzxHJ2hGIjipZIUk3TsIZ/g==
=Iv0X
- -----END PGP SIGNATURE-----



- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOzdR6Sh9+71yA2DNAQEzfAP8DW/b9NyOiQGjf/k3hFbw1Ncwx3ns7y8K
wJDLQz3ubX4lvRXmXdyG/Tt6dPcRsUtkKqQijxDdBhgbkfjUgeYYg8hrzexZX7Sp
eFVupgTZkAou/Vh1p9Isq3b84IodEi/TvAX5FFgHlkjqOaWX3k4NH8/ovwNCkRUG
E6ZFenq84ik=
=dicI
-----END PGP SIGNATURE-----