what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Office Excel Record Processing Code Execution

Microsoft Office Excel Record Processing Code Execution
Posted Mar 11, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability affecting Microsoft Office Excel. The flaw is caused by a memory corruption error when processing malformed "EntExU2" records in an Excel document, which could be exploited by attackers to execute arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-0257
SHA-256 | 13f9968930b3332dbfde62e94caad311f358ab18e12e54fe2ff3b65655a29182

Microsoft Office Excel Record Processing Code Execution

Change Mirror Download
VUPEN Security Research - Microsoft Office Excel Record Processing Code 
Execution Vulnerability

http://www.vupen.com/english/research.php


I. BACKGROUND
---------------------

"Microsoft Office Excel is a powerful tool you can use to create and
format spreadsheets, and analyze and share information to make more
informed decisions. With the Microsoft Office Fluent user interface,
rich data visualization, and PivotTable views, professional-looking
charts are easier to create and use." (microsoft.com)


II. DESCRIPTION
---------------------

VUPEN Vulnerability Research Team discovered a critical vulnerability
affecting Microsoft Office Excel.

The flaw is caused by a memory corruption error when processing
malformed "EntExU2" records in an Excel document, which could be
exploited by attackers to execute arbitrary code.


III. AFFECTED PRODUCTS
--------------------------------

Microsoft Office Excel 2002 Service Pack 3
Microsoft Office XP Service Pack 3


IV. Exploits - PoCs & Binary Analysis
----------------------------------------

In-depth binary analysis of the vulnerability and a code exeution
exploit have been released by VUPEN through the VUPEN Binary Analysis
& Exploits Service :

http://www.vupen.com/exploits


V. SOLUTION
----------------

Apply security update (MS10-017):
http://www.microsoft.com/technet/security/bulletin/ms10-017.mspx


VI. CREDIT
--------------

The vulnerability was discovered by Nicolas JOLY of VUPEN Security


VII. ABOUT VUPEN Security
---------------------------------

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be
exploited, ensure security policy compliance and meaningfully measure
and manage risks.

VUPEN also provides in-depth binary analysis of vulnerabilities and
commercial-grade exploit codes to help security vendors, governments,
and corporations to evaluate and qualify risks, and protect their
infrastructures and assets.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services

* VUPEN Binary Analysis & Exploits Service :

http://www.vupen.com/exploits


VIII. REFERENCES
----------------------

http://www.vupen.com/english/advisories/2010/0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0257
http://www.microsoft.com/technet/security/bulletin/ms10-017.mspx



IX. DISCLOSURE TIMELINE
-----------------------------------

2009-07-17 - Vendor notified
2009-07-19 - Vendor response
2010-01-26 - Status update received
2010-03-03 - Status update received
2010-03-09 - Coordinated public Disclosure


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close