Hackers have released attack code for a critical vulnerability in Microsoft Word - the third such bug in the past week.
The proof of concept code was posted on Tuesday on the Milw0rm.com website, making it widely available to the hacking community. It exploits a previously unreported bug in Word.
Like the other recent Word bugs disclosed this past week, it could be used by attackers to run unauthorised software on a victim's computer, said David Marcus, security research and communications manager with McAfee's Avert Labs
Attackers have been using the Word exploits in targeted attacks, where a small number of people are sent an email with a maliciously encoded Word document attached. The hackers use social engineering techniques to try to trick the victim into opening the dangerous attachment.
In a recent attack, a malicious email was sent "to a very high-profile company, directly to three people at the company," Marcus said. Microsoft is investigating reports of this latest Word bug, a spokesman for the company's public relations agency said.
Though they are not being widely exploited, the unpatched Word vulnerabilities are causing some enterprises concern.
At the Port of Seattle, for example, users are being cautioned and email with Word attachments is getting a little more scrutiny, said Ernie Hayden, chief information security manager with the port. "We've done some blocking on our email, and we've had dialogue with people with respect to what our expectations are," he said.
Attacks on Microsoft's Office software have been on the rise for months now, said Marc Maiffret, chief technology officer with security vendor eEye Digital Security. Office vulnerabilities were once released "on a monthly basis," he said. "Now we're at the point were it's almost daily."
Still, publishing attack code ultimately works contrary to the interests of the bad guys, he added. "It's kind of disruptive, and it creates a panic," he said. "But all it does is make the industry focus and come up with a resolution."