[NT] Microsoft Excel FORMAT Record Invalid Array Index Vulnerability (MS08-044)
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 13 Aug 2008 08:07:34 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Microsoft Excel FORMAT Record Invalid Array Index Vulnerability (MS08-044)
Microsoft <http://office.microsoft.com/excel/> Excel is "the spreadsheet
application that is included with Microsoft Corp.'s Office productivity
software suite". Remote exploitation of an invalid array indexing
vulnerability in Microsoft Corp.'s Excel could allows attackers to execute
arbitrary code with the privileges of the current user.
* Office 2000 SP-3 fully patched as of March 2008
This issue exists in the handling of "FORMAT" records within an Excel
spreadsheet (XLS). By crafting a spreadsheet with an out-of-bounds array
index, attackers are able to cause Excel to write a byte to arbitrary
locations in stack memory.
Exploitation allows an attacker to execute arbitrary code in the context
of the currently logged-on user. To exploit this vulnerability, the
attacker must persuade a user to open a specially crafted Excel (XLS)
Likely attack vectors include sending the file as an e-mail attachment or
linking to the file on a website. By default, systems with Office 2000
installed will open Office documents, including Excel spreadsheet files,
from websites without prompting the user. This allows attackers to exploit
this vulnerability without user interaction. Later versions of Office do
not open these documents automatically unless the user has chosen this
Using the Office Document Open Confirmation Tool for Office 2000 can
prevent Office files on web sites from opening automatically. Use of this
tool is highly recommended for users still using Office 2000.
Microsoft has officially addressed this vulnerability with Security
Bulletin MS08-044. For more information, consult their bulletin at the
03/27/2008 - Initial vendor notification
03/28/2008 - Initial vendor response
08/12/2008 - Coordinated public disclosure
The information has been provided by
<mailto:idlabs-advisories@xxxxxxxxxxxx> iDefense Labs Security Advisories.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Microsoft Windows Color Management Module Heap Buffer Overflow Vulnerability (MS08-046)
- Next by Date: [EXPL] Apache Tomcat Directory Traversal Vulnerability (Exploit #2)
- Previous by thread: [NT] Microsoft Windows Color Management Module Heap Buffer Overflow Vulnerability (MS08-046)
- Next by thread: [EXPL] Apache Tomcat Directory Traversal Vulnerability (Exploit #2)