===================================================================== CERT-Renater Note d'Information No. 2006/VULN516 _____________________________________________________________________ DATE : 11/10/2006 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Microsoft Excel. ====================================================================== http://www.microsoft.com/technet/security/Bulletin/MS06-059.mspx MS06-059 - Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (924164) - Microsoft Office 2000 Service Pack 3 - Microsoft Excel 2000 - Microsoft Office XP Service Pack 3 - Microsoft Excel 2002 - Microsoft Office 2003 Service Pack 1 or Service Pack 2 - Microsoft Office Excel 2003 - Microsoft Office Excel Viewer 2003 - Microsoft Office 2004 for Mac - Microsoft Excel 2004 for Mac - Microsoft Office v. X for Mac - Microsoft Excel v. X for Mac - Microsoft Works Suites: - Microsoft Works Suite 2004 - Microsoft Works Suite 2005 - Microsoft Works Suite 2006 - From Microsoft Security Bulletin MS06-059: Vulnerability details: Excel Malformed DATETIME Record Vulnerability - CVE-2006-2387: A remote code execution vulnerability exists in Excel. An attacker could exploit this vulnerability when Excel parses a file and processes a malformed DATETIME record. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. Excel Malformed STYLE Record Vulnerability - CVE-2006-3431: A remote code execution vulnerability exists in Excel. An attacker could exploit this vulnerability when Excel parses a file and processes a malformed STYLE record. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. Excel Handling of Lotus 1-2-3 File Vulnerability - CVE-2006-3867: A remote code execution vulnerability exists in Excel. An attacker could exploit this vulnerability when Excel handles a Lotus 1-2-3 file. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. Malformed COLINFO Record Vulnerability - CVE-2006-3875: A remote code execution vulnerability exists in Excel. An attacker could exploit this vulnerability when Excel parses a file and processes a malformed COLINFO record. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================