Vigil@nce : MS Excel, remote code execution via record
August 2008 by Vigil@nce
SYNTHESIS
An attacker can create a malicious spreadsheet, in order to
execute code.
Gravity: 3/4
Consequences: privileged access/rights
Provenance: document
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 13/08/2008
Identifier: VIGILANCE-VUL-8019
IMPACTED PRODUCTS
– Microsoft Excel [confidential versions]
– Microsoft Office SharePoint Server [confidential versions]
– Microsoft Word [confidential versions]
DESCRIPTION
While opening an xls file, MS Excel loads the content of the
document without any specific checking on the file.
A file containing an malicious record can be used to execute code.
An attacker can therefore create a malicious Excel spreadsheet,
send it to a victim, and if this last open it, code can be
executed on the computer.
CHARACTERISTICS
Identifiers: 954066, CVE-2008-3006, MS08-043, VIGILANCE-VUL-8019