[NT] Microsoft Excel Malformed Object Memoy Corruption Vulnerability (MS08-074)
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 11 Dec 2008 10:58:39 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Microsoft Excel Malformed Object Memoy Corruption Vulnerability (MS08-074)
Excel is the spreadsheet application included with Microsoft Corp.'s
Office productivity software suite. Remote exploitation of a memory
corruption vulnerability in Microsoft Corp.'s Excel spreadsheet could
allow attackers to execute arbitrary code with the privileges of the
* Office 2000 SP3 fully patched as of July 2008.
This issue exists in the handling of certain malformed object records
within an Excel spreadsheet (XLS), allowing memory corruption to occur.
This could lead to an exploitable situation.
iDefense's proof of concept code can redirect the program execution flow
to a user controllable address on Excel 2000 SP3, and crash on other
versions of Excel, including Excel XP SP3, Excel 2003 SP3 and Excel 2007
Exploitation allows an attacker to execute arbitrary code in the context
of the currently logged-on user. To exploit this vulnerability, the
attacker must persuade a user to open a specially crafted Excel (XLS)
Likely attack vectors include sending the file as an e-mail attachment or
linking to the file on a website. By default, systems with Office 2000
installed will open Office documents, including Excel spreadsheet files,
from websites without prompting the user. This allows attackers to exploit
this vulnerability without user interaction. Later versions of Office do
not open these documents automatically unless the user has chosen this
Using the Office Document Open Confirmation Tool for Office 2000 can
prevent Office files from opening automatically from web sites. Use of
this tool is highly recommended for users still using Office 2000.
Microsoft Corp. has released a patch which addresses this issue. For more
information, consult their advisory at the following URL.
07/21/2008 - Initial Vendor Notification
07/22/2008 - Initial Vendor Reply
07/24/2008 - Additional Vendor Feedback
12/09/2008 - Coordinated Public Disclosure
The information has been provided by
<mailto:idlabs-advisories@xxxxxxxxxxxx> iDefense Labs Security Advisories.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [UNIX] Multiple listen()s on Same Socket Corrupts the Linux Vcc Table
- Next by Date: [NT] Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability (MS08-071)
- Previous by thread: [UNIX] Multiple listen()s on Same Socket Corrupts the Linux Vcc Table
- Next by thread: [NT] Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability (MS08-071)