Secunia Advisory SA38805

Microsoft Office Excel Multiple Vulnerabilities
Secunia Advisory SA38805
Release Date 2010-03-09
Last Update 2010-03-10
   
Popularity 1,094 view
Comments 0 comments

Criticality level Highly criticalHighly critical
Impact System access
Where From remote
Authentication level Available in Customer Area
   
Report reliability Available in Customer Area
Solution Status Vendor Patch
   
Secunia PoC Available in Customer Area
Secunia analysis Available in Customer Area
   
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia CSI, Secunia PSI
Automated scanning Secunia CSI, Secunia PSI
   
Software:
Microsoft Excel 2002
Microsoft Excel 2003
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2004 for Mac
Microsoft Office 2007
Microsoft Office 2008 for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Microsoft Office Excel 2007
Microsoft Office Excel Viewer 2007
Microsoft Office SharePoint Server 2007
Microsoft Office XP
Microsoft Open XML File Format Converter for Mac

Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2010-0257 CVSS available in Customer Area
CVE-2010-0258 CVSS available in Customer Area
CVE-2010-0260 CVSS available in Customer Area
CVE-2010-0261 CVSS available in Customer Area
CVE-2010-0262 CVSS available in Customer Area
CVE-2010-0263 CVSS available in Customer Area
CVE-2010-0264 CVSS available in Customer Area
  

Description
Multiple vulnerabilities have been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.

1) An error in the parsing of records can be exploited to corrupt memory via a specially crafted file.

2) An error in the parsing of sheet object types can be exploited to corrupt memory via a specially crafted file.

3) An error in the parsing of MDXTUPLE records can be exploited to cause a heap-based buffer overflow via a specially crafted file.

4) An error in the parsing of MDXSET records can be exploited to cause a heap-based buffer overflow via a specially crafted file.

5) An error in the parsing of FNGROUPNAME records may result in the use of uninitialised memory via a specially crafted file.

6) An error in the parsing of a ZIP header within XLSX files when decompressing certain XML elements may result in use of uninitialised memory.

7) An error in the parsing of DbOrParamQry records can be exploited to corrupt memory via a specially crafted file.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

Solution
Apply patches.
Further details available in Customer Area

Provided and/or discovered by
1) The vendor credits Nicolas Joly, Vupen.
2-5) Sean Larsson, VeriSign iDefense Labs.
6) An anonymous person via ZDI.
7) The vendor credits Damián Frizza, Core Security Technologies.

Changelog
Further details available in Customer Area

Original Advisory
MS10-017 (KB980150, KB978471, KB978474, KB978382, KB980837, KB980839, KB980840, KB978383, KB978380, KB979439):
http://www.microsoft.com/technet/security/bulletin/ms10-017.mspx

iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=859
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=860
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=861
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=862

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-10-025/

Core Security:
http://www.coresecurity.com/content/CORE-2009-1103

Deep Links
Links available in Customer Area


Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
Subject: Microsoft Office Excel Multiple Vulnerabilities
 
No posts yet

-

You must be logged in to post a comment.



footer
© 2002-2010 Secunia ApS • Weidekampsgade 14A, Copenhagen, Denmark • +45 7020 5144 • Contact Us
Terms & Conditions and CopyrightReport vulnerability
CVE logo OTA logo First logo