Solved

Unable to open embedded pdf in Word 2010

Posted on 2012-04-12
10
185 Views
Last Modified: 2016-03-28
I have a user who is emailing a large word document to several other users.  This is a Word 2007 file which contains embedded pdf files.  I have one user who is within our network and is able to open the embedded files.  Another user, who is not on our network, is unable to open the files - an error is received indicating the source file can not be found.

Any ideas as to why this is happening?  The file is not corrupt because some users can open it.  My understading is because it's an embedded file, it should be able to be opened by users both in & outside the network.

Thank you
0
Comment
Question by:TricanWS
10 Comments
 
LVL 17

Expert Comment

by:Anuroopsundd
Comment Utility
Check the version of Word with which it is embedded and the user who is not able to open.
0
 

Author Comment

by:TricanWS
Comment Utility
Thanks Anuroopsundd.

Both users are using Office 2010.
0
 
LVL 3

Expert Comment

by:algorith
Comment Utility
If the file is saved as a .docx, it may have embedded links to the extra content, as opposed to the actual content? You could try checking this by looking inside the .docx file.  
 
The .docx format is a zip archive - it can be opened using an unzip program like 7-zip (in particular using the "open archive" function)

Once it is open, look under
    word
        embeddings
            oleObject1.bin
                CONTENTS
This is the actual pdf file, if it is available.  In my test case I can extract this as a file, rename it to have a .pdf extension, and then open it directly with acrobat.
0
 

Author Comment

by:TricanWS
Comment Utility
Thanks Algorith.

The file was created in Office 2007 so it is a .doc not a .docx.  

The users are not saving the file, they are opening it within Outlook.

The users trying to open the file are on Office 2010 and some can open the file, so the actual content is there.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 3

Expert Comment

by:algorith
Comment Utility
.doc files have mostly the same junk as .docx, just in the old proprietary format. I never figured out how to see their contents, though.

Are there any out-of-network users that can open the embedded pdf?  I still wonder if the embedded contents might be a link rather than the actual file?   Either that, or Outlook may be doing "security"...I am no help in that case...
0
 
LVL 31

Expert Comment

by:Paul Sauvé
Comment Utility
"I have one user who is within our network and is able to open the embedded files.  Another user, who is not on our network, is unable to open the files - an error is received indicating the source file can not be found."
My impression is that the pdf file is not embedded, but LINKED to the Word document. Anyone on your network can open the link, but anyone NOT on your network does not have acces to the PDF file.
0
 
LVL 3

Expert Comment

by:algorith
Comment Utility
OK, so I thought about this a bit more.  I suggest one of the users with Word 2010 save the file as a .docx, then mail that back to you. At this point you could check its contents (as I described above) to verify whether the problematic .pdf is actually embedded.  If so, I think that leaves "security"...
0
 

Accepted Solution

by:
TricanWS earned 0 total points
Comment Utility
Thanks everyone.  Just a bit of an update from my end.  The file is definitely embedded.  We have had success with users both inside and outside the network opening this file.  At this point it would appear to be a localized issue on the one user's computer.
0
 
LVL 13

Expert Comment

by:frankhelk
Comment Utility
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Introduction Authors who set out to write any sort of lengthy piece for online submission—be it a long question or comment on a technical form, an article, or a substantial blog entry—often find it useful to work up a draft in an editor other t…
The Selection object is designed for user interaction. It has a Range property, so it can be used in most places that a Range object can. Recorded macros must use the Selection because they are simply copying what the user is doing. A Range prope…
The viewer will learn how to make their project stand out over others by learning how to change colors and shapes, add spaces, change directions, and add bullets to their charts.
This Micro Tutorial well show you how to find and replace special characters in Microsoft Word. This is similar to carriage returns to convert columns of values from Microsoft Excel into comma separated lists.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now