=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2006/VULN516
_____________________________________________________________________

DATE                      : 11/10/2006

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Microsoft Excel.

======================================================================
http://www.microsoft.com/technet/security/Bulletin/MS06-059.mspx


MS06-059 - Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution
           (924164)

   - Microsoft Office 2000 Service Pack 3
     - Microsoft Excel 2000
   - Microsoft Office XP Service Pack 3
     - Microsoft Excel 2002
   - Microsoft Office 2003 Service Pack 1 or Service Pack 2
     - Microsoft Office Excel 2003
     - Microsoft Office Excel Viewer 2003
   - Microsoft Office 2004 for Mac
     - Microsoft Excel 2004 for Mac
   - Microsoft Office v. X for Mac
     - Microsoft Excel v. X for Mac
   - Microsoft Works Suites:
     - Microsoft Works Suite 2004
     - Microsoft Works Suite 2005
     - Microsoft Works Suite 2006

- From Microsoft Security Bulletin MS06-059:

   Vulnerability details:

   Excel Malformed DATETIME Record Vulnerability - CVE-2006-2387:

   A remote code execution vulnerability exists in Excel. An attacker could
   exploit this vulnerability when Excel parses a file and processes a malformed
   DATETIME record.

   If a user were logged on with administrative user rights, an attacker who
   successfully exploited this vulnerability could take complete control of an
   affected system. An attacker could then install programs; view, change, or
   delete data; or create new accounts with full user rights. Users whose
   accounts are configured to have fewer user rights on the system could be less
   affected than users who operate with administrative user rights.

   Excel Malformed STYLE Record Vulnerability - CVE-2006-3431:

   A remote code execution vulnerability exists in Excel. An attacker could
   exploit this vulnerability when Excel parses a file and processes a malformed
   STYLE record.

   If a user were logged on with administrative user rights, an attacker who
   successfully exploited this vulnerability could take complete control of an
   affected system. An attacker could then install programs; view, change, or
   delete data; or create new accounts with full user rights. Users whose
   accounts are configured to have fewer user rights on the system could be less
   affected than users who operate with administrative user rights.

   Excel Handling of Lotus 1-2-3 File Vulnerability - CVE-2006-3867:

   A remote code execution vulnerability exists in Excel. An attacker could
   exploit this vulnerability when Excel handles a Lotus 1-2-3 file.

   If a user were logged on with administrative user rights, an attacker who
   successfully exploited this vulnerability could take complete control of an
   affected system. An attacker could then install programs; view, change, or
   delete data; or create new accounts with full user rights. Users whose
   accounts are configured to have fewer user rights on the system could be less
   affected than users who operate with administrative user rights.

   Malformed COLINFO Record Vulnerability - CVE-2006-3875:

   A remote code execution vulnerability exists in Excel. An attacker could
   exploit this vulnerability when Excel parses a file and processes a malformed
   COLINFO record.

   If a user were logged on with administrative user rights, an attacker who
   successfully exploited this vulnerability could take complete control of an
   affected system. An attacker could then install programs; view, change, or
   delete data; or create new accounts with full user rights. Users whose
   accounts are configured to have fewer user rights on the system could be less
   affected than users who operate with administrative user rights.

======================================================================

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================


