Security companies moved quickly to keep consumers protected

Nov 7, 2013 13:17 GMT  ·  By

Microsoft found a major vulnerability flaw in Windows and Office that allows attackers to get the same privileges as the logged on user with the help of a compromised document.

Security institute AV-TEST analyzed three different malicious DOCX files used to exploit the vulnerability, determining that some of the anti-virus products on the market are already capable of protecting their users.

As a result, consumers are strongly recommended to update their security apps to make sure that no attack is targeting their computers until Microsoft rolls out a fully working patch for the flaw.

Here are the security apps that can block the exploit and the virus definition that’s being used:

Avast -> TIFF:CVE-2013-3906 [Expl] AVG -> Exploit_c.YWT (Trojan horse) Bitdefender -> Exploit.CVE-2013-3906.Gen ESET Nod32 -> Win32/Exploit.CVE-2013-3906.A trojan F-Secure -> Exploit.CVE-2013-3906.Gen G Data -> Exploit.CVE-2013-3906.Gen Kaspersky -> Exploit.MSOffice.CVE-2013-3906.a, Exploit.OLE2.CVE-2012-1856.b Microsoft -> Exploit:Win32/CVE-2013-3906 Norman -> Shellcode.B, Shellcode.D Norton / Symantec -> Trojan.Hantiff, Trojan.Mdropper Sophos -> Exp/20133906-A, Troj/DocDrop-AP