Endpoint Protection

 View Only
  • 1.  Microsoft Word .rft Exploit

    Posted Mar 26, 2014 10:36 PM

    Is this exploit protected by Symantec? Our SEPM is version 12.1.4, but most of our workstations and servers are 12.1.1101.401. Is there a rapid release virus definition for this.

    Thanks



  • 2.  RE: Microsoft Word .rft Exploit

    Posted Mar 26, 2014 10:40 PM

    Yes see this

    Zero-Day Vulnerability Discovered in Microsoft Word

    https://www-secure.symantec.com/connect/blogs/zero-day-vulnerability-discovered-microsoft-word

     



  • 3.  RE: Microsoft Word .rft Exploit

    Posted Mar 26, 2014 10:43 PM

    Subscribe to this post

    https://www-secure.symantec.com/connect/blogs/zero-day-vulnerability-discovered-microsoft-word

    Symantec finds it

    Symantec Security Response offers the following detections to protect our customers from the CVE-2014-1761 exploit. 

    AV

    IPS



  • 4.  RE: Microsoft Word .rft Exploit

    Posted Mar 26, 2014 11:04 PM

    Just make sure you have the total protection of SEP (AV, PTP and NTP) with updated definitions, also with updated patch updates to prevent this exploit.

     

    Regards,

    JM

     



  • 5.  RE: Microsoft Word .rft Exploit

    Posted Mar 27, 2014 12:37 AM

    Thanks everyone. I was also thinking about letting users know not to open any .rtf doc extensions and disabling their preview pane in email.



  • 6.  RE: Microsoft Word .rft Exploit

    Posted Mar 27, 2014 06:29 AM

    Good idea. Security awareness is a very important step in the process.



  • 7.  RE: Microsoft Word .rft Exploit

    Posted Mar 27, 2014 12:16 PM

    See latest Blog

    Emerging Threat: Microsoft Word Zero Day (CVE-2014-1761) Remote Code Execution Vulnerability

    https://www-secure.symantec.com/connect/blogs/emerging-threat-microsoft-word-zero-day-cve-2014-1761-remote-code-execution-vulnerability



  • 8.  RE: Microsoft Word .rft Exploit

    Posted Apr 13, 2014 11:09 PM

    Hi valley_girl1919,

    Do you need more help here ?