There currently is not a lot of information on this vulnerability or exploit. It is being referred to as a zero day exploit. As it stands, it will NOT probably be patched with the November Microsoft updates.
It seems to be leveraging a previous version of Word to accomplish the exploit. From that the best advice I can offer is for people to make sure they are using Office2010 and not to open previous versions of Word documents outside of the preview mode if they originate from someone other than a trusted source.
All indications are that the current version of Sophos virus definitions do detect this malware.
Other resources with info on the condition as it is currently known.
Subject: – Vulnerability in Microsoft Windows – RISK: HIGH
MULTI-STATE INFORMATION SHARING AND ANALYSIS CENTER CYBER SECURITY ADVISORY
MS-ISAC ADVISORY NUMBER:
Vulnerability in Microsoft Windows Could Allow Remote Code Execution
A recently identified malicious software, called W32.Duqu or Duqu, has been taking advantage of an unpatched vulnerability in the Microsoft Windows Kernel which is a critical component of a computer operating system that provides basic services for all other parts of the operating system. This vulnerability could allow a remote attacker to take control of a system if a user opens a specially crafted Microsoft Word file. An attacker could then install programs; view, change, or delete data; or create new accounts with full system rights.
- Microsoft Windows XP
- Microsoft Vista
- Microsoft Windows 7
- Microsoft Windows Server 2003
- Microsoft Windows Server 2008
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: High
A zero-day vulnerability was discovered in the Microsoft Windows Kernel that could result in remote code execution with kernel-level privileges. The researchers responsible for identifying the vulnerability concluded that the Trojan known as W32.Duqu has been successfully exploiting the vulnerability. The University concluded that the Trojan known as W32.Duqu was successfully exploiting the vulnerability. Microsoft has been notified of the vulnerability and is expected to address the issue.
The specifics of this vulnerability are currently unknown at this time. Attackers can exploit this issue by creating a specially crafted Microsoft Word ‘.doc’ file and distributing the file to unsuspecting users. File distribution is likely to occur through attachments or links embedded in email messages.Successful exploitation has been documented to allow remote code execution resulting in the installation of malicious software.
Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
We recommend the following actions be taken:
- When available, apply the appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing.
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
- Remind users not to open e-mail attachments from unknown users or suspicious e-mails from trusted sources.
- Apply the principle of Least Privilege to all services.
Laboratory of Cryptography and System Security:
Update – November 4
Microsoft has released a fixit utility for this exposure. Additional details are available at –