Lucene search

K
srcinciteSteven Seeley of Source InciteSRC-2016-0038
HistoryJun 29, 2016 - 12:00 a.m.

SRC-2016-0038 : Microsoft Office Excel EOF Record Type Confusion Remote Code Execution Vulnerability

2016-06-2900:00:00
Steven Seeley of Source Incite
srcincite.io
10

0.12 Low

EPSS

Percentile

95.3%

Vulnerability Details:

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of an EOF Record. The type value of the allocated object is not checked before being used in an operation leading to an Out-of-Bounds read condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.

Affected Vendors:

Microsoft

Affected Products:

Office Excel

  • Microsoft Excel 2007 Service Pack 3
  • Microsoft Excel 2010 Service Pack 2 (32-bit editions)
  • Microsoft Excel 2010 Service Pack 2 (64-bit editions)
  • Microsoft Excel 2013 Service Pack 1 (32-bit editions)
  • Microsoft Excel 2013 Service Pack 1 (64-bit editions)
  • Microsoft Excel 2013 RT Service Pack 1
  • Microsoft Excel 2016 (32-bit edition)
  • Microsoft Excel 2016 (64-bit edition)
  • Microsoft Office Compatibility Pack Service Pack 3
  • Microsoft Excel Viewer
    Vendor Response:

Microsoft has issued an update to correct this vulnerability. More details can be found at: <https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3363&gt;
Proof of Concept:
<https://github.com/sourceincite/poc/blob/master/SRC-2016-0038.xls&gt;