---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Microsoft Excel Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32211 VERIFY ADVISORY: http://secunia.com/advisories/32211/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Microsoft Open XML File Format Converter for Mac http://secunia.com/advisories/product/20148/ Microsoft Office SharePoint Server 2007 http://secunia.com/advisories/product/13227/ Microsoft Office Excel Viewer 2003 http://secunia.com/advisories/product/7700/ Microsoft Office Excel Viewer http://secunia.com/advisories/product/19210/ Microsoft Office Excel 2007 http://secunia.com/advisories/product/14161/ Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats http://secunia.com/advisories/product/14165/ Microsoft Office 2008 for Mac http://secunia.com/advisories/product/17922/ Microsoft Office 2004 for Mac http://secunia.com/advisories/product/8713/ Microsoft Excel 2003 http://secunia.com/advisories/product/4970/ Microsoft Excel 2002 http://secunia.com/advisories/product/4043/ Microsoft Excel 2000 http://secunia.com/advisories/product/3054/ Microsoft Office 2000 http://secunia.com/advisories/product/24/ Microsoft Office 2003 Small Business Edition http://secunia.com/advisories/product/2277/ Microsoft Office 2003 Standard Edition http://secunia.com/advisories/product/2275/ Microsoft Office 2003 Student and Teacher Edition http://secunia.com/advisories/product/2278/ Microsoft Office 2003 Professional Edition http://secunia.com/advisories/product/2276/ Microsoft Office 2007 http://secunia.com/advisories/product/13228/ Microsoft Office XP http://secunia.com/advisories/product/23/ DESCRIPTION: Some vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to potentially compromise a user's system. 1) Insufficient validation of data in a VBA Performance Cache can be exploited via a specially crafted file. 2) An error in the loading of Excel objects can be exploited to corrupt memory via a specially crafted file. 3) An integer overflow in the REPT function when handling formulas inside cells can be exploited via a specially crafted file. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. SOLUTION: Apply patches. Excel 2000 SP3: http://www.microsoft.com/downloads/details.aspx?FamilyId=1b2740e0-ecdd-48ca-84e0-eb187c31eb16 Excel 2002 SP3: http://www.microsoft.com/downloads/details.aspx?FamilyId=27cedef1-c47c-472c-a343-cd9b4ebc2bba Excel 2003 SP2: http://www.microsoft.com/downloads/details.aspx?FamilyId=4df27e8a-d803-483b-a700-0177d71bf368 Excel 2003 SP3: http://www.microsoft.com/downloads/details.aspx?FamilyId=4df27e8a-d803-483b-a700-0177d71bf368 Excel 2007: http://www.microsoft.com/downloads/details.aspx?FamilyId=2765bbc0-ea2e-4b6e-822c-222ee8e5021f Excel 2007 SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=2765bbc0-ea2e-4b6e-822c-222ee8e5021f Microsoft Office Excel Viewer 2003: http://www.microsoft.com/downloads/details.aspx?FamilyId=9769ce08-5207-4c63-b7b9-536266ad6b2b Microsoft Office Excel Viewer 2003 SP3: http://www.microsoft.com/downloads/details.aspx?FamilyId=9769ce08-5207-4c63-b7b9-536266ad6b2b Microsoft Office Excel Viewer: http://www.microsoft.com/downloads/details.aspx?FamilyId=83c88444-75b8-44d1-b280-3671394ade45 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats: http://www.microsoft.com/downloads/details.aspx?FamilyId=9a7be004-5903-4101-90c5-c0d5f8722af9 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=9a7be004-5903-4101-90c5-c0d5f8722af9 Microsoft Office 2004 for Mac: http://www.microsoft.com/downloads/details.aspx?FamilyId=BA4FA21A-7E01-4EF8-9B9F-9D51D00EF094 Microsoft Office 2008 for Mac: http://www.microsoft.com/downloads/details.aspx?FamilyId=E70C5AE0-2858-46DE-81F8-DCD1786656B7 Open XML File Format Converter for Mac: http://www.microsoft.com/downloads/details.aspx?FamilyId=2A8D9A3B-B8A4-43B6-82A6-A2E7D16AE11D Microsoft Office SharePoint Server 2007 (with Excel Services installed): http://www.microsoft.com/downloads/details.aspx?FamilyId=5c29e646-504c-4455-9d35-9a1bed6d7535 Microsoft Office SharePoint Server 2007 SP1 (with Excel Services installed): http://www.microsoft.com/downloads/details.aspx?FamilyId=5c29e646-504c-4455-9d35-9a1bed6d7535 Microsoft Office SharePoint Server 2007 x64 Edition (with Excel Services installed): http://www.microsoft.com/downloads/details.aspx?FamilyId=3c21c405-2c9e-45d0-be4d-8ccd093af31f Microsoft Office SharePoint Server 2007 x64 Edition SP1 (with Excel Services installed): http://www.microsoft.com/downloads/details.aspx?FamilyId=3c21c405-2c9e-45d0-be4d-8ccd093af31f PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits: * Lionel d'Hauenens, Labo Skopia via iDefense VCP. * Joshua J. Drake, iDefense. 2) The vendor credits Wushi via Zero Day Initiative. 3) Reported by the vendor. ORIGINAL ADVISORY: MS08-057 (KB956416): http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------