Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators may consider configuring the Microsoft Office Isolated Conversion Environment (MOICE)
as the registered handler for .doc
Administrators may consider configuring the Microsoft Office File Block policy to prevent binary .doc
Administrators may consider using the Microsoft Baseline Security Analyzer (MBSA)
scan tool to identify common security misconfigurations and missing security updates on system endpoints.
Administrators may consider configuring the Microsoft Enhanced Mitigation Experience Toolkit (EMET)
to work with the affected software.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.
Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.
Administrators are advised to monitor critical systems.