Microsoft released its February set of security updates yesterday, including critical fixes for bugs in Office and the scanning engine used by the company's security products.

The security software flaw is of particular concern because it could, in theory, be very easily exploited by an attacker to run unauthorised software on a victim's PC.

The bug relates to the way Microsoft's Malware Protection Engine, used by Windows Live One Care and Windows Defender, processes PDF files. Windows Defender is available for free and ships with Microsoft's Windows Vista operating system.

"An attacker could exploit the vulnerability by constructing a specially crafted PDF File that could potentially allow remote code execution when the target computer system receives, and the Microsoft Malware Protection Engine scans, the PDF file," Microsoft said in its bulletin on the patch.

This engine is also used by Microsoft's Antigen and Windows Forefront Security products, meaning that Exchange servers running these products could also be compromised.

Although there’s not yet any known attack that exploits this flaw, it could become a serious problem for Windows users running Microsoft's security products, according to Amol Sarwate, vulnerability lab manager at Qualys. "These attacks are very difficult to avoid," he said. "These products run automatically in the background."

Symantec rated this scanning engine flaw the most critical of the vulnerabilities patched.

In total, six of Microsoft's 12 updates are rated as "critical”, the other six have the less-serious rating of "important”.

Among the patches is a widely anticipated update for Microsoft Word, which fixes six bugs in Microsoft's word-processing software. Hackers had been exploiting a number of these bugs in very targeted attacks over the past few months.

Other critical patches fix bugs in the ActiveX HTML Help control and Microsoft Data Access Components, both used by Windows, as well as flaws in Office and Internet Explorer.