Microsoft issues emergency security advisory and Fix it for Office exploit: SSO Alert Priority High
6 November 2013
On 5 November 2013, Microsoft issued an emergency security advisory for a vulnerability affecting Microsoft Office (2003, 2007 and 2010), Windows Vista, Windows Server and Microsoft Lync.
The vulnerability in Office is known to have been targeted by cyber criminals. Microsoft’s website states that, "An attacker could exploit this vulnerability by convincing a user to preview or open a specially crafted email message, open a specially crafted file, or browse specially crafted web content."
Microsoft has offered a temporary 'Fix it' workaround which is suitable for some scenarios only. Check the notes in the Fix it information first to see if it applies to you.
Microsoft will provide a more permanent security update as soon as possible.
The information provided here is of a general nature. Everyone's circumstances are different. If you require specific advice you should contact your local technical support provider.
Thank you to those subscribers who have provided feedback to our Alerts and Newsletters. We are very interested in your feedback and where possible take on board your suggestions or requests.
This information has been prepared by Enex TestLab for the Department of Communications ('the Department'). It was accurate and up to date at the time of publishing.
This information is general information only and is intended for use by private individuals and small to medium sized businesses. If you are concerned about a specific cyber security issue you should seek professional advice.
The Commonwealth, Enex TestLab, and all other persons associated with this advisory accept no liability for any damage, loss or expense incurred as a result of the provision of this information, whether by way of negligence or otherwise.
Nothing in this information (including the listing of a person or organisation or links to other web sites) should be taken as an endorsement of a particular product or service.
Please note that third party views or recommendations included in this information do not reflect the views of the Commonwealth, or indicate its commitment to a particular course of action. The Commonwealth also cannot verify the accuracy of any third party material included in this information.