Lucene search

K
certCERTVU:493185
HistoryJan 09, 2007 - 12:00 a.m.

Microsoft Excel vulnerable to arbitrary code execution via malformed record

2007-01-0900:00:00
www.kb.cert.org
11

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.767 High

EPSS

Percentile

98.2%

Overview

A vulnerability in Microsoft Excel may allow an attacker to execute arbitrary code on a vulnerable system.

Description

A vulnerability exists in the way Microsoft Excel handles malformed records.

Per Microsoft Security Bulletin MS07-002:
A remote code execution vulnerability exists in Microsoft Excel. An attacker could exploit this vulnerability when Excel parses a file and processes a malformed record.


Impact

A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.


Solution

Upgrade

Microsoft has issued an update to address this issue. See Microsoft Security Bulletin MS07-002 for more details.

Note that Microsoft has re-released the updates in Microsoft Security Bulletin MS07-002 for Excel 2000. See the Microsoft Security Response Center blog for more information.


Do not open untrusted Excel documents

Do not open unfamiliar or unexpected Excel or other Office documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010.

Do not rely on file name extension filtering

In most cases, Windows will call Excel to open a document even if the document has an unknown file extension. For example, if spreadsheet.qwer contains the correct file header information, Windows will open spreadsheet.qwer with Excel. Filtering for common extensions (e.g., .xls, .xlt, .csv) will not detect all Excel documents.


Vendor Information

493185

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: January 09, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See Microsoft Security Bulletin MS07-002 for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23493185 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Jie Ma publicly reported this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-0028
Severity Metric: 0.14 Date Public:

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.767 High

EPSS

Percentile

98.2%

Related for VU:493185