Microsoft Office and Excel Vulnerabilities
Systems Affected
- Microsoft Office for Windows and Mac OS X
- Microsoft Excel for Windows and Mac OS X
- Microsoft Works Suite for Windows
For more complete information, refer to the Microsoft Security Bulletin Summary for March 2006.
Overview
Microsoft has released updates that address critical vulnerabilities
in Microsoft Office and Excel. Exploitation of these
vulnerabilities could allow a remote, unauthenticated attacker to
execute arbitrary code or cause a denial of service on a vulnerable
system.
Description
Microsoft
Security Bulletin Summary for March 2006 addresses vulnerabilities
in Microsoft Office and Excel. Further information is available in the
following US-CERT Vulnerability Notes:
VU#339878 -
Microsoft Excel malformed parsing format file memory corruption vulnerability
Microsoft Excel contains a memory corruption vulnerability. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-0028)
VU#104302 -
Microsoft Excel malformed record memory corruption vulnerability
Microsoft Excel fails to properly validate records. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-0031)
VU#123222 -
Microsoft Excel malformed graphic memory corruption vulnerability
Microsoft Excel fails to properly validate graphics. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-0030)
VU#235774 -
Microsoft Excel malformed description memory corruption vulnerability
Microsoft Excel fails to properly validate the description field. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-0029)
VU#642428 -
Microsoft Excel fails to properly perform range validation when parsing document files
Microsoft Excel contains an error in range validation, which may allow
a remote, unauthenticated attacker to execute arbitrary code on a
vulnerable system.
(CVE-2005-4131)
VU#682820 -
Microsoft Office routing slip buffer overflow
Microsoft Office contains a buffer overflow in the parsing of routing slips, which may allow an attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-0009)
Impact
A remote, unauthenticated attacker could execute arbitrary code with
the privileges of the user. If the user is logged on with
administrative privileges, the attacker could take complete control
of an affected system. An attacker may also be able to cause a denial
of service.
Solution
Apply Updates
Microsoft has provided the updates for these vulnerabilities in the
Security Bulletins and on the Microsoft Update site.
Workarounds
Please see the following US-CERT Vulnerability Notes for workarounds.
Appendix A. References
- Microsoft Security Bulletin Summary for March 2006 - http://www.microsoft.com/technet/security/bulletin/ms06-mar.mspx
- US-CERT Vulnerability Note VU#339878 - http://www.kb.cert.org/vuls/id/339878
- US-CERT Vulnerability Note VU#104302 - http://www.kb.cert.org/vuls/id/104302
- US-CERT Vulnerability Note VU#123222 - http://www.kb.cert.org/vuls/id/123222
- US-CERT Vulnerability Note VU#235774 - http://www.kb.cert.org/vuls/id/235774
- US-CERT Vulnerability Note VU#642428 - http://www.kb.cert.org/vuls/id/642428
- US-CERT Vulnerability Note VU#682820 - http://www.kb.cert.org/vuls/id/682820
- CVE-2005-4131 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4131
- CVE-2006-0009 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0009
- CVE-2006-0028 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0028
- CVE-2006-0029 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0029
- CVE-2006-0030 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0030
- CVE-2006-0031 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0031
- Microsoft Update - https://update.microsoft.com/microsoftupdate
Feedback can be directed to the US-CERT Technical Staff.
Revision History
-
March 14, 2006: Initial release
Last updated
This product is provided subject to this Notification and this Privacy & Use policy.