VUPEN Security Research - Microsoft Office Excel Record Processing Code Execution Vulnerability http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "Microsoft Office Excel is a powerful tool you can use to create and format spreadsheets, and analyze and share information to make more informed decisions. With the Microsoft Office Fluent user interface, rich data visualization, and PivotTable views, professional-looking charts are easier to create and use." (microsoft.com) II. DESCRIPTION --------------------- VUPEN Vulnerability Research Team discovered a critical vulnerability affecting Microsoft Office Excel. The flaw is caused by a memory corruption error when processing malformed "EntExU2" records in an Excel document, which could be exploited by attackers to execute arbitrary code. III. AFFECTED PRODUCTS -------------------------------- Microsoft Office Excel 2002 Service Pack 3 Microsoft Office XP Service Pack 3 IV. Exploits - PoCs & Binary Analysis ---------------------------------------- In-depth binary analysis of the vulnerability and a code exeution exploit have been released by VUPEN through the VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/exploits V. SOLUTION ---------------- Apply security update (MS10-017): http://www.microsoft.com/technet/security/bulletin/ms10-017.mspx VI. CREDIT -------------- The vulnerability was discovered by Nicolas JOLY of VUPEN Security VII. ABOUT VUPEN Security --------------------------------- VUPEN is a leading IT security research company providing vulnerability management and security intelligence solutions which enable enterprises and institutions to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. VUPEN also provides in-depth binary analysis of vulnerabilities and commercial-grade exploit codes to help security vendors, governments, and corporations to evaluate and qualify risks, and protect their infrastructures and assets. * VUPEN Vulnerability Notification Service: http://www.vupen.com/english/services * VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/exploits VIII. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/0566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0257 http://www.microsoft.com/technet/security/bulletin/ms10-017.mspx IX. DISCLOSURE TIMELINE ----------------------------------- 2009-07-17 - Vendor notified 2009-07-19 - Vendor response 2010-01-26 - Status update received 2010-03-03 - Status update received 2010-03-09 - Coordinated public Disclosure