SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Microsoft Excel Vendors:   Microsoft
Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016430
SecurityTracker URL:  http://securitytracker.com/id/1016430
CVE Reference:   CVE-2006-3431   (Links to External Site)
Updated:  Oct 10 2006
Original Entry Date:  Jul 4 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2000, 2002, 2003, 2004 for Mac, 2004 v. X for Mac
Description:   A vulnerability was reported in Microsoft Excel. A remote user may be able to cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted Excel file that, when loaded and processed by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

A specially crafted STYLE record can trigger the vulnerability.

Some user interaction may be required to trigger the vulnerability.

The vulnerability may only affect certain Asian-language versions.

Microsoft has confirmed this vulnerability as being different than any of the other recently reported Excel vulnerabilities.

nanika reported this vulnerability.

Impact:   A remote user can create a file that, when loaded and processed by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Excel 2000:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A4B2A672-481B-4AF6-89FE-DE8D321D99E0

Microsoft Excel 2002:

http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984

Microsoft Office Excel 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A81A8537-E2B0-4629-8973-40C4F32D9728

Microsoft Office Excel Viewer 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=74C72657-634D-4C31-A366-C68043FE3B34

Microsoft Excel 2004 for Mac:

http://www.microsoft.com/mac/

Microsoft Excel v. X for Mac:

http://www.microsoft.com/mac/

Microsoft Works Suite 2004:

http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984

Microsoft Works Suite 2005:

http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984

Microsoft Works Suite 2006:

http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-059.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-059.mspx (Links to External Site)
Cause:   Input validation error
Underlying OS:   UNIX (OS X), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Date:  Mon, 03 Jul 2006 07:23:33 +0000
Subject:  Excel 2000/XP/2003 Style 0day POC

Excel 2000/XP/2003 Style 0day POC


POC

http://www.hitcon.org/Nanika.xls


Description:

A vulnerability has been discovered in Microsoft Excel, which can be exploited by malicious people to compromise a user's system.




Excel 2003 & XP 

EIP-> 00xx00xx

Click Repair Mode .......Exploit....:P



Excel 2000

Click Style

EIP-> xxxxxxxx




http://hitcon.org/index.htm

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC