ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] Microsoft Excel Multiple Code Execution Vulnerabilities



Secunia Advisory:       SA20686 Print Advisory  
Release Date:   2006-06-16
Last Update:    2006-07-11

Critical:       
Extremely critical
Impact: System access
Where:  From remote
Solution Status:        Vendor Patch

Software:       Microsoft Excel 2000
Microsoft Excel 2002
Microsoft Excel 2003
Microsoft Excel Viewer 2003
Microsoft Office 2000
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2004 for Mac
Microsoft Office X for Mac
Microsoft Office XP

        Select a product and view a complete list of all
Patched/Unpatched Secunia advisories affecting it.

CVE reference:  CVE-2006-1301
CVE-2006-1302
CVE-2006-1304
CVE-2006-1306
CVE-2006-1308
CVE-2006-1309
CVE-2006-2388
CVE-2006-3059

Description:
Multiple vulnerabilities have been reported in Microsoft Excel, which
can be exploited by malicious people to compromise a user's system.

1) An error within the processing of "SELECTION" records can be
exploited to corrupt memory via a malicious Excel document containing a
malformed "SELECTION" record.

According to the vendor, this vulnerability is being exploited in the
wild.

2) Another error within the processing of "SELECTION" records can also
be exploited to corrupt memory via a malicious Excel document containing
a malformed "SELECTION" record.

3) An error within the processing of "COLINFO" records can be exploited
to corrupt memory via a malicious Excel document containing a malformed
"COLINFO" record.

4) An error within the processing of "OBJECT" records can be exploited
to corrupt memory via a malicious Excel document containing a malformed
"OBJECT" record.

5) An error within the processing of "FNGROUPCOUNT" values can be
exploited to corrupt memory via a malicious Excel document containing a
malformed "FNGROUPCOUNT" value.

6) An error within the processing of "LABEL" records can be exploited to
corrupt memory via a malicious Excel document containing a malformed
"LABEL" record.

7) An error when rebuilding files with malformed charts can be exploited
to corrupt memory via a specially crafted Excel file.

8) A memory corruption error in the "repair mode" functionality used for
repairing corrupted documents can be exploited to execute arbitrary code
via a specially crafted Excel documents.

NOTE: This vulnerability is a so-called 0-day and is already being
actively exploited.

Successful exploitation of the vulnerabilities allows execution of
arbitrary code.

Solution:
Apply patches.

Microsoft Excel 2003 (requires Office 2003 SP1/SP2):
http://www.microsoft.com/downloa...518C-0FB3-4381-BB42-BCA71A4FD646

Microsoft Excel Viewer 2003 (requires Office 2003 SP1/SP2):
http://www.microsoft.com/downloa...66AB-CCD1-47A1-8A5A-B288A5204369

Microsoft Excel 2002 (requires Office XP SP3):
http://www.microsoft.com/downloa...F77F-BE33-4913-B68D-6A375D5FE130

Microsoft Excel 2000 (requires Office 2000 SP3):
http://www.microsoft.com/downloa...AD6D-582C-4185-ADE1-671D2128D3EE

Microsoft Excel 2004 for Mac:
http://www.microsoft.com/mac/

Microsoft Excel v. X for Mac:
http://www.microsoft.com/mac/

Provided and/or discovered by:
1) The vendor credits Posidron.
2) The vendor credits NSFocus Security Team.
3) The vendor credits NSFocus Security Team.
4) The vendor credits Sowhat of Nevis Labs, Arnaud Dovi, and iDEFENSE.
5) The vendor credits Xin Ouyang of Nevis Networks.
6) The vendor credits Shaun Colley, NGSS Consulting.
7) The vendor credits Arnaud Dovi.
8) Discovered in the wild (the vendor also credits Costin Ionescu,
Symantec)

Changelog:
2006-06-20: Added additional information from Microsoft. Added CVE
reference. Updated "Solution" section by referring to vendor
workarounds.
2006-07-11: Added additional vulnerabilities. Updated "Solution"
section.

Original Advisory:
MS06-037 (KB917285):
http://www.microsoft.com/technet/security/Bulletin/MS06-037.mspx

Microsoft:
http://www.microsoft.com/technet/security/advisory/921365.mspx
http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx


Please note: The information, which this Secunia Advisory is based upon,
comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports
issued by security research groups, vendors, and others.




 




Copyright © Lexa Software, 1996-2009.