The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
So if a malicious RTF(Rich Text Formatting file is opened inside Microsoft Word it will allow the attacker to run commands that normally cannot be run.
So it is possible we have yet to see the full effects on this vulnerability., as viruses and other attacks are being crafted(very likely).
The Microsoft ‘fix’ initially is to not allow RTF files to be opened.
Applying the Microsoft Fix it solution, “Disable opening RTF content in Microsoft Word,” prevents the exploitation of this issue through Microsoft Word.
“This is not a fix, just a kludge” says TonyZ – as people will open these files not knowing what will happen.
Here we have scanned a server and found it had a few services turned on that should not have been. (Telnet and ftp should be replaced with a secure version, such as ssh and scp)
The web services need to be tested further for potential application vulnerabilities (with the Sigma-∑ scan)
Port 20000, and 2222 are not typical ports used by legitimate applications, in fact 2222 has been known to be a BackDoor trojan: Speedguide.net has some information. This machine has to be investigated for malicious software.
This is the reason for the Alpha scan – so that unknown ports running on your machines will be uncovered.