[NT] Microsoft Excel Chart AxesSet Invalid Array Index Vulnerability (MS08-043)



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Microsoft Excel Chart AxesSet Invalid Array Index Vulnerability (MS08-043)
------------------------------------------------------------------------


SUMMARY

Microsoft <http://office.microsoft.com/excel/> Excel is "the spreadsheet
application that is included with Microsoft Corp.'s Office productivity
software suite". Remote exploitation of an invalid array indexing
vulnerability in Microsoft Corp.'s Excel could allow an attacker to
execute arbitrary code with the privileges of the current user.

DETAILS

Vulnerable Systems:
* Office 2000 SP-3 fully patched as of March 2008

This issue exists in the handling of "AxesSet" records within a chart
embedded in a spreadsheet. This record is typically used for setting the
location and size of a set of axes on a chart. This particular record type
is not included in Microsoft's official documentation for the Excel file
format. However, the freely available source code for OpenOffice
implements this record type.

When processing this record, Excel does not validate a value that is used
as an index into the array of chart axes. By crafting an Excel spreadsheet
(XLS) that contains an out-of-bounds array value, an attacker can cause
memory corruption. This leads to a potentially exploitable condition.

Analysis:
Exploitation allows an attacker to execute arbitrary code in the context
of the currently logged-on user. To exploit this vulnerability, the
attacker must persuade a user to open a specially crafted Excel (XLS)
document.

Likely attack vectors include sending the file as an e-mail attachment or
linking to the file on a website. By default, systems with Office 2000
installed will open Office documents, including Excel spreadsheet files,
from websites without prompting the user. This allows attackers to exploit
this vulnerability without user interaction. Later versions of Office do
not open these documents automatically unless the user has chosen this
behavior.

Using the Office Document Open Confirmation Tool for Office 2000 can
prevent Office files on web sites from opening automatically. Use of this
tool is highly recommended for users still using Office 2000.

Vendor response:
Microsoft has officially addressed this vulnerability with Security
Bulletin MS08-043. For more information, consult their bulletin at the
following URL:
<http://www.microsoft.com/technet/security/bulletin/ms08-043.mspx>
http://www.microsoft.com/technet/security/bulletin/ms08-043.mspx

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3004>
CVE-2008-3004

Disclosure timeline:
03/27/2008 - Initial vendor notification
03/31/2008 - Initial vendor response
08/12/2008 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by
<mailto:idlabs-advisories@xxxxxxxxxxxx> iDefense Labs Security Advisories.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=740>
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=740



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NT] Microsoft Excel Code Execution (MS07-002)
    ... Microsoft Excel Code Execution ... An attacker could then install programs; view, change, or delete data; or ... A remote code execution vulnerability exists in Microsoft Excel. ... If a user is logged on with administrative user rights, ...
    (Securiteam)
  • [NT] Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability (MS08-071)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability ... Exploitation allows an attacker to execute arbitrary code with the ... targeted user to view a specially crafted image file. ...
    (Securiteam)
  • [NEWS] @Mail Web Interface Multiple Security Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... attacker to point it to mailbox of any registered user in @Mail system. ... Vulnerability 2: SQL database install - Multiple SQL Injection ...
    (Securiteam)
  • [NT] Vulnerabilities in Microsoft Excel Allows Code Execution (MS06-059)
    ... Vulnerabilities in Microsoft Excel Allows Code Execution ... A remote code execution vulnerability exists in Excel. ... If a user were logged on with administrative user rights, an attacker who ...
    (Securiteam)
  • [NT] EMC Legato Networker DoS and Multiple Buffer Overflows
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... EMC Legato Networker DoS and Multiple Buffer Overflows ... The vulnerability specifically exists due to improper handling of ... is sent by an attacker, it is possible to overwrite portions of heap ...
    (Securiteam)