Some days ago has been found 0-day vulnerability in the Microsoft PowerPoint.
Unspecified vulnerability in mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows remote user-complicit attackers to execute arbitrary commands via a crafted PPT file, which causes a “memory corruption error,” and exploited by Trojan.PPDropper.B
For protect your PC follow next instructions:
- Don`t use administrator rights account for browse internet and check mail. Or use DropRights : How to drop rights for safe surf for make it.
- Don`t Open, Save, Cancel unknown attachments.
- Don`t visit unknown sites.
- Use PowerPoint Viewer 2003 to open and view files. PowerPoint Viewer 2003 does not contain the vulnerable code and is not susceptible to this attack. You can download PowerPoint Viewer 2003 for free.
- If you can, apply strict filtering of PPT files (maybe at least quarantine them, so they can be scanned and reviewed later). Users should be extra careful when opening PowerPoint files until Microsoft releases a patch (or some workaround is available)
- Good idea to turn on memory-based security mechanisms (Data Execution Prevention).