Originally posted by: kylef
- WordPad is vulnerable to this issue through .wri, .rtf, and .doc file name associations. By default, if any supported version of Microsoft Word is installed, through the .rtf and .doc file associations, these document types will open in Microsoft Word instead of WordPad. Microsoft Word does not contain this vulnerability. WordPad could also be used to manually open malicious documents; this could include files with file name extensions other than .wri, .rtf, and .doc because WordPad will process the malicious document the same regardless of the file name extension.
Wow, that's really funny. All this time, I thought that it was Word that was more-or-less vulnerable to these sorts of things, and that WordPad, due to its smaller size and feature-set, wasn't. It always did bother me though, in the back of my mind, downloading .doc files and reading them on my box. Hmm.
🙁
Guess I'll have to cross off a few more file extensions from my "presumed safe to open" list, thanks to MS. (There really aren't too many left, any more. What's next - infected .TXT files??!?!? Wait, don't answer that.)
Originally posted by: kylef
A true "remote vulnerability" means that the box is vulnerable without a user sitting there doing things to enable the attack in realtime.
No, that's a "remote network vulnerability".
Originally posted by: kylef
This is more like a spoofing attack or trojan horse: get the user to open a malicious .doc or .rtf using WordPad as an Administrator. Unless all of those conditions are met, it won't work.
And we all know how
truely difficult it is to get a user to click on a potentially-malicious URL... and how
totally unlikely it is for an end-user to be running with Admin privs, especially since MS makes it so easy to run without, especially on XP Home.
😛 I mean, most of these MS vulns., are totally not even an issue! I mean, people reporting them must simply just be hating on MS, jealous of all of BillG's bling-bling, ya know?