Exploitation of Recently Disclosed Vulnerability - Microsoft Office
Date: 13 April 2017
The purpose of this alert is to bring attention to a recently disclosed vulnerability in the Encapsulated PostScript filter of Microsoft Office and its exploitation.
CCIRC is aware of attacks exploiting recently patched zero-day vulnerabilities. As a result, CCIRC would like to raise awareness concerning this potentially serious vulnerability, as it may be exploited by malicious actors to perform a range of fraudulent activities, such as accessing sensitive information and installing malware.
Due to the elevated risk that this vulnerability presents, CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly. CCIRC recommends that priority is given to that patch.
Microsoft Guidance Advisory
TR11-001 Malware Infection Recovery Guide
TR15-004 Top 30 Targeted High Risk Vulnerabilities
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: