Bonum Certa Men Certa

Taking Microsoft OOXML to Task

Any Windows/Office debuggers in the audience?

The following is a reproduction of a new post from Rex Ballard (I started this discussion thread), whose previous post we quoted the other day.




Message-ID: <31a66169-d9e7-4715-9e9e-e3488ebd36a9@25g2000hsx.googlegroups.com> From: Rex Ballard <rex.ballard@gmail.com> Newsgroups: comp.os.linux.advocacy Subject: Re: Leaked ISO Document Reveals Crooked ISO Amid MS OOXML Corruptions Date: Sat, 12 Jul 2008 08:20:23 -0700 (PDT)

[...]

ODF is a comprehensive document that provides detailed specifications from the high level document content down to the smallest elements of scalable vector graphics. There are some "standard" mime object types that are supported, such as PNG and JPEG, but other embedded formats must be installed using plug-ins which have to be authenticated by the user and by the system at installation time, and cannot be installed by the content. Furthermore, the installed content can easily be identified as trustworthy or not, and can be restricted in it's capabilities.

OpenXML on the other hand, is a high-level specification which describes the high level envelopes used to embed binary objects which are included in the content. The content itself contains the binary code which can call any function in any Microsoft library and has all permissions of the person opening the document. If a user account is set up as "Administrator", then the application can mess with the registry, create, download, and hide files, can execute applications in those files, can install any number of new viruses, and generally wreak havoc on the system.

I'll leave it to others to document the exact details (as I said, I'm busy these days), but I'm sure anyone who tries to publish these vulnerabilites will probably find themselves getting the same treatment that Tracy Reed of Ultraviolet.org got when he tried to publish his warnings about ActiveX controls back in 1997. Microsoft got a court injunction against him, and forced him to take down the content, claiming that it was being used to encourage hacking, and was damaging the Microsoft brand.

“I got a couple of docx documents and had trouble getting them to open, even with the plug-in for Office XP. Next thing I know, I get a notice from my registry auditor that I have 1300 new registry errors.”Over the last 10 years, we've seen these very same techniques, documented back in 1997, used widely to spread viruses including Melissa, Nimda, Sky, BugBear, and about 250,000 other viruses, worms, and malware, not including spy-ware and other "Microsoft Authorized" invasions of our privacy.

I got a couple of docx documents and had trouble getting them to open, even with the plug-in for Office XP. Next thing I know, I get a notice from my registry auditor that I have 1300 new registry errors. And suddenly, my PC is churning the disk-drive and the network connection at 3:00 AM (I'm getting old and have to get up), and the network shows that I'm uploading something at full speed, even though my computer is supposedly sleeping.

It isn't a back-up program that I'm running.

I would encourage COLA readers and OSS advocates to explore this in more detail.

get someone with Office 2007 to send you a docx file. unzip it using pkzip or winzip or unzip.

look at the binary files.

replace one binary object with another.

zip up the document,

see if your office-2007 user can read the "enhanced" document.

For those of you with OLE programming skills, create an OLE object that creates a file, and e-mails that file to you using smtp.

Send a document with this new ole object embedded (along with the others) and see if you get an e-mail.

I haven't tried this, and I don't know if it will work. I'm not sure how hard it would be to make it work. I just think it might be an interesting project worth investigating, especially if you are considering the migration of a few thousand users to Vista and Office 2007.

I'd love to see what the results turn out to be. After all, if it's that easy to take control of a recipient's machine just by sending them a "trusted" Word, Excel, or PowerPoint attachment, just think how much chaos a really aggressive malicious hacker, with a goal of obtaining marketable information about your business, could do.




Does ISO really want to approve such a 'virus'? As an international standard even? If someone tests the above, please post the outcome here or elsewhere. It would prove invaluable.

The last time a chain of ISO problems was cited, Ian Easson challenged an argument from Groklaw. He might wish read the following lengthy follow-up. ISO is in a deeper puddle of mud than before.

Brazil is a P member of SC 34, so according to my reading of the clause, it has the right to appeal if any of the three above issues apply, and arguably they all do. According to South Africa, if the issue is ISO's reputation, or if there is a matter of principle involved, Brazil can appeal. Even point three could apply, in that Brazil raises matters such as incorrect tabulation of votes, which, if true, one would hope ISO wasn't aware of.

[...]

Why did they bother to go, one might ask? Why vote, if votes disappear from the record? By my reading, Brazil paints a picture of an orchestrated event, tilted away from criticism or a negative result and a refusal to give substantive consideration to issues delegates wanted to discuss, due to time constraints Brazil calls arbitrary, and worse.


For details about the BRM in question, see [1, 2, 3, 4, 5, 6, 7, 8] and have your jaw sink to the floor. It was a bad plan from the get-go [1, 2, 3, 4, 5], but Emperor Microsoft was in a hurry and it even used its lobbyist Jan Van Den Beld to change the rules 'on the fly'.

OOXML protests in India
From the Campaign for Document Freedom

Recent Techrights' Posts

Sponsored by Linux Foundation
All the pages are full of 'Linux' Foundation ads that are not about Linux
It's Hard to Dispose or Get Rid of Swasticars Now
'Memecars' only sell as long as people have a 'belief' in them
 
Links 13/03/2025: COVID-19 Legacies and "Modern" Cars as Spying Machines on Wheels
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 12, 2025
IRC logs for Wednesday, March 12, 2025
The Fall of the Open Source Initiative (OSI): Microsoft-Sponsored OSI is Probably Not Even the Real Steward of the Open Source Definition, It's More Like an Identity Thief at This Point (Like "FSFE", a Microsoft-Sponsored Imposter of FSF)
As we'll show later, many people (even inside OSI) are very angry at the OSI right now
Gemini Links 12/03/2025: Cataloging Books, Ramen, and MElon
Links for the day
Links 12/03/2025: Anti-Union Actions and New Efforts at Truce/Ceasefire in Ukraine
Links for the day
CodeWeavers Ads Weaved by LLM Slop at BetaNews
How much of this was even touched by a human being?
Springtime Plans
We currently have two long series underway
In Australia, iOS Estimated to be Bigger Than or Equal to Windows
Not even counting macOS
Brett Wilson LLP Does Not Deny Microsoft or Another "Third Party" Secretly Funds the SLAPPs Against Techrights, Bankrolling Despicable People Who Deserve Criticism
Writing about crime is not a crime
Gemini Links 12/03/2025: LLM Slop Lacks a Future, Wordle Clone Comes to Gemini Protocol
Links for the day
Using FUD That Blames "Linux" for Typos, Turning It Into LLM Slop That Blames "Linux" for Typos
It is probably the "leader" at LLM slop (fake 'articles') about "Linux"
Links 12/03/2025: Big Cuts to US Education and Science (e.g. NOAA)
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, March 11, 2025
IRC logs for Tuesday, March 11, 2025
Crossbow murders: prevention, missed opportunities
Reprinted with permission from Daniel Pocock
This yt-dlp Bug Report Shows Us That the Future of YouTube is DRM and It's Time to Leave (yt-dlp Should Also Leave Microsoft GitHub, Which Censors YouTube Downloaders)
GAFAM traps aren't "free hosting"; they herd us all into a world of tollbooths and locks, surveillance and planned obsolescence (you own nothing, you only rent)
Ukraine Didn't Take Twitter/X Down, Microsoft or Windows Likely Did
There are many debunkings (to likely false accusations), but won't that just be another example of Windows TCO, exacerbated externally in the form of Windows botnets?
The Fall of the Open Source Initiative (OSI): Worse Than What the Media Has Focused on, Losing Sight of Who Owns and Runs the OSI
Members' dues are less than 3% of the income; where does the 97+ percent come from other than Microsoft?
Apple Seems to Have Run Out of Things to Boast About After Apple Vision Pro Failed Spectacularly
With "Apple Intelligence", Apple has finally named a product after what target customers lack
Slopwatch: Reckless FUD and Machine-Generated Spam from LinuxSecurity.com, cybersecuritynews.com, and gbhackers.com (Google Boosts LLM Slop About "Linux")
Google and so-called 'Google News' continue to yield anti-Linux misinformation
Gemini Links 11/03/2025: 'Chainsaw Politicians' and Proprietary Software Hell
Links for the day
Links 11/03/2025: Covid-19 5 Years On and Violence in Syria
Links for the day
Links 11/03/2025: NASA Besieged and "DOGE Has Become What It Claimed To Destroy"
Links for the day
Fresh IBM Layoffs Reported in Europe and North America, Jobs Allegedly Moved to South Asia (Low Salaries)
As usual, IBM does not talk about this
Illuminating Injustice is Critical When Reckless Microsofters and Law Firms Try to Silence Reporters of Violence Against Women
I want to clarify that I'm well within my right (and not running afoul of any rules) by explaining what goes on here
EPO Central Staff Committee: "The Strategy of the Office Lacks Transparency and Cannot be Understood"
Microsoft and the EPO violate data protection laws
Microsoft Has Not Much Left to Show Investors, Shares Fall Almost 20%
It's not even clear how Microsoft makes money anymore
Links 11/03/2025: Spring and Misfin Server
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 10, 2025
IRC logs for Monday, March 10, 2025