SHARE
Facebook X Pinterest WhatsApp

Microsoft Dismisses PowerPoint Zero-Day Warning

Microsoft is pouring cold water on a warning from anti-virus vendor Trend Micro that a new PowerPoint zero-day attack is under way. The Trend Micro warning, first issued Aug. 19, said that a specially crafted “.ppt” file was being used to exploit an undocumented PowerPoint vulnerability. The Japanese anti-virus company said it received a sample […]

Written By: Ryan Naraine
Aug 21, 2006
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Microsoft is pouring cold water on a warning from anti-virus vendor Trend Micro that a new PowerPoint zero-day attack is under way.

The Trend Micro warning, first issued Aug. 19, said that a specially crafted “.ppt” file was being used to exploit an undocumented PowerPoint vulnerability.

The Japanese anti-virus company said it received a sample of the file Aug. 17, less than two weeks after Microsoft shipped a security update to fix a PowerPoint flaw.

However, according to Stephen Toulouse, a program manager in the MSRC (Microsoft Security Response Center), the vulnerability has already been resolved by an update.

“Our initial investigation is that this is not a new zero-day at all,” Toulouse said in an e-mail exchange with eWEEK.

Click here to read more about a recent PowerPoint zero-day attack.

The Trend Micro warning, which was posted without any communication with Microsoft, caught the MSRC off guard, Toulouse said.

“Usually, we receive communication from the [anti-virus] partners prior to going public so that we can confirm,” he said.

In this case, Toulouse said the MSRC reached out to Trend Micro for a sample of the malware file to verify whether it was indeed exploiting an unpatched issue.

After receiving a sample, Toulouse said Trend Micro’s zero-day claim was incorrect.

According to Trend Micro, the double-barreled attack includes the use of TROJ_MDROPPER.BH, a Trojan dropper that exploits a PowerPoint bug.

Once executed, the malware drops another file on the infected machine which has been identified as TROJ_SMALL.CMZ.

Trend Micro said the second file, when executed, waits for an active Internet connection and attempts to access certain URLs to download and execute possibly malicious files on the affected system.

Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Recommended for you...

AI Customer Service Fails to Satisfy Consumer Needs: Verizon
Franklin Okeke
Aug 19, 2025
GoTo Pulse Survey Shows AI Promise, Highlights Gaps to Fill
Victoria Durgin
Aug 19, 2025
Deepgram Teams With AWS on Voice AI Deployment
Jordan Smith
Aug 19, 2025
Excendio Advisors Q&A: How to Prepare Your MSP for M&A
Victoria Durgin
Aug 19, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.