### Description
Microsoft SharePoint is prone to a vulnerability that lets attackers access local files. An attacker can exploit this vulnerability to retrieve local files from a vulnerable computer in the context of the vulnerable service. Information obtained may aid in further attacks.
### Technologies Affected
* Microsoft Groove 2007 SP2
* Microsoft Groove Server 2010
* Microsoft Groove Server 2010 SP1
* Microsoft Office Forms Server 2007 SP2
* Microsoft Office Groove Data Bridge Server 2007 SP2
* Microsoft Office Groove Management Server 2007 SP2
* Microsoft Office Web Apps 2010
* Microsoft Office Web Apps 2010 SP1
* Microsoft SharePoint Foundation 2010
* Microsoft SharePoint Server 2007 SP2
* Microsoft SharePoint Server 2007 x64 SP2
* Microsoft SharePoint Server 2010 Enterprise Edition
* Microsoft SharePoint Server 2010 SP1
* Microsoft SharePoint Server 2010 Standard Edition
* Microsoft SharePoint Services 3.0 SP2
* Microsoft SharePoint Services 64-bit 3.0 SP2
* Microsoft SharePoint Workspace 2010
* Microsoft SharePoint Workspace 2010 SP1
### Recommendations
**Block external access at the network boundary, unless external parties require service.**
Filter access to the affected computer at the network boundary if global access isn't required. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.
**Deploy network intrusion detection systems to monitor network traffic for malicious activity.**
Deploy NIDS to detect and block attacks and anomalous activity. Review logs from network devices regularly.
**Run all software as a nonprivileged user with minimal access rights.**
Run all server software in a closed or restricted environment such as chroot or jail to limit the consequences of a successful exploit.
**Permit privileged access for trusted individuals only.**
Allow privileged access to software and resources to known and trusted individuals only.
Vendor updates are available. Please see the references for more information.