Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Vigil@nce : MS Excel, remote code execution via record

August 2008 by Vigil@nce


An attacker can create a malicious spreadsheet, in order to execute code.

Gravity: 3/4

Consequences: privileged access/rights

Provenance: document

Means of attack: no proof of concept, no attack

Ability of attacker: expert (4/4)

Confidence: confirmed by the editor (5/5)

Diffusion of the vulnerable configuration: high (3/3)

Creation date: 13/08/2008

Identifier: VIGILANCE-VUL-8019


- Microsoft Excel [confidential versions]
- Microsoft Office SharePoint Server [confidential versions]
- Microsoft Word [confidential versions]


While opening an xls file, MS Excel loads the content of the document without any specific checking on the file.

A file containing an malicious record can be used to execute code.

An attacker can therefore create a malicious Excel spreadsheet, send it to a victim, and if this last open it, code can be executed on the computer.


Identifiers: 954066, CVE-2008-3006, MS08-043, VIGILANCE-VUL-8019

See previous articles


See next articles