---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Microsoft Excel Three Code Execution Vulnerabilities SECUNIA ADVISORY ID: SA25150 VERIFY ADVISORY: http://secunia.com/advisories/25150/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Microsoft Office XP http://secunia.com/product/23/ Microsoft Office Excel 2007 http://secunia.com/product/14161/ Microsoft Office 2007 http://secunia.com/product/13228/ Microsoft Office 2004 for Mac http://secunia.com/product/8713/ Microsoft Office 2003 Student and Teacher Edition http://secunia.com/product/2278/ Microsoft Office 2003 Standard Edition http://secunia.com/product/2275/ Microsoft Office 2003 Small Business Edition http://secunia.com/product/2277/ Microsoft Office 2003 Professional Edition http://secunia.com/product/2276/ Microsoft Office 2000 http://secunia.com/product/24/ Microsoft Excel Viewer 2003 http://secunia.com/product/7700/ Microsoft Excel 2003 http://secunia.com/product/4970/ Microsoft Excel 2002 http://secunia.com/product/4043/ Microsoft Excel 2000 http://secunia.com/product/3054/ Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats http://secunia.com/product/14165/ DESCRIPTION: Three vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to compromise a user's system. 1) An error when handling malformed BIFF records can be exploited to corrupt memory via a specially crafted file. 2) An error when handling set font values within Excel files can be exploited to corrupt memory via a malicious file containing a specially crafted set font value. 3) An error when handling filter records can be exploited to corrupt memory via a specially crafted file. Successful exploitation of the vulnerabilities allows execution of arbitrary code. SOLUTION: Apply patches. Microsoft Excel 2000 (Office SP3): http://www.microsoft.com/downloads/details.aspx?FamilyId=5F101D03-C0A7-41E0-95A4-A12AFB356D5F Microsoft Excel 2002 (Office SP3): http://www.microsoft.com/downloads/details.aspx?FamilyId=29596861-D9F0-4A10-9E1C-CDA75DDE017D Microsoft Excel 2003 (Office SP2): http://www.microsoft.com/downloads/details.aspx?FamilyId=9567C583-556F-4379-80BA-3E0C8993C04C Microsoft Excel 2003 Viewer: http://www.microsoft.com/downloads/details.aspx?FamilyId=3C7F18AC-24BB-41CF-B8DA-997706FDC44C Microsoft Office Excel 2007: http://www.microsoft.com/downloads/details.aspx?FamilyId=CED9F11B-CE48-47A3-9288-BD11B80F3D85 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats: http://www.microsoft.com/downloads/details.aspx?FamilyId=50A7924F-DB51-438A-B27D-37E40A471E60 Microsoft Office 2004 for Mac: http://www.microsoft.com/mac PROVIDED AND/OR DISCOVERED BY: 1) Discovered by Manuel Santamarina Suarez and reported via ZDI. 2) Reported by the vendor. 3) The vendor credits Greg MacManus, iDefense Labs. ORIGINAL ADVISORY: MS07-023 (934233): http://www.microsoft.com/technet/security/Bulletin/MS07-023.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------