Last Updated: 2006-07-15 00:03:53 UTC
by Bojan Zdrnja (Version: 3)
Symantec has a write-up of this; it doesn't look like it's wide spread at all at the moment.
Microsoft is working on this issue and they've posted some information on their blog.
Most of the major AV vendors received samples of the infected PPT file and added detection for it so far. However, this doesn't mean that you can completely relax now – while we don't know what part of the infected PPT file they use for detection, it is quite possible that new exploits for this same vulnerability (once and if they are released) will not be detected properly (we've seen this before with other vulnerabilities in Microsoft Office product, Excel for example).
At this moment we are not sure exactly which versions of Microsoft PowerPoint are affected by this vulnerability. It looks like all versions 2000 through to 2003 are vulnerable.
We also can't confirm whether the PowerPoint Viewer utility is or isn't affected.
There is a CVE entry for this vulnerability, http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3590.
Juha-Matti created a nice FAQ about this vulnerability (similarly to his previous Excel vulnerability FAQ). You can find it at http://blogs.securiteam.com/?p=508.
It is worth reminding you that, as with previous vulnerabilities in Microsoft Office applications, there are not many options you have in protecting your networks. If you can, apply strict filtering of PPT files (maybe at least quarantine them, so they can be scanned and reviewed later). Users should be extra careful when opening PowerPoint files until Microsoft releases a patch (or some workaround is available).
While we can't confirm that this would stop the exploit from executing, it is a good idea to turn on memory-based security mechanisms (Data Execution Prevention).
If you went to Symantec's web site with the description of the Trojan being dropped, you probably saw the screen shot of the PowerPoint slide which is displayed once the file is opened in PowerPoint. One of our readers, Vince, sent us the translation of this:
"What is love? Sending her 999 roses knowing she doesn't love him.
What is waste? Sending her 999 roses know she loves him."
Interesting, isn't it? If this was displayed with all infected documents, it makes us wonder who was targeted with this. It is quite possible that that the original exploit was written by some other author who then maybe sold it to bad guys – this sounds to me like a typical "I'm in love, here's my worm/virus/exploit dedicated to her" thing; we've seen such worms/viruses many times before.
UPDATE 2 07/14/2006
Three (!!!) PoCs for this vulnerability(ies) have just been publicly posted.
From what we can tell at the moment, they all just crash PowerPoint, but they show where the vulnerabilities are, so a full exploit can be written.
This is a first step to remote exploitation so we can unfortunately expect to see some malware using this very soon (and we though it will be another quiet weekend).
Again, stress out to users how important it is to be very careful when opening PowerPoint files (and if possible, don't open them at all until the patch is out). Otherwise you'll have to rely on your desktop anti-virus product to catch the dropped component, and we all know how (un)reliable this can be.