Advisory Details

February 7th, 2011

(0Day) Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability

ZDI-11-040
ZDI-CAN-811

CVE ID CVE-2011-0980
CVSS SCORE 9.0, AV:N/AC:L/Au:N/C:P/I:P/A:C
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Office Excel
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10818']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The flaw occurs when parsing a document with a malformed Excel document. When parsing an office art object, the application will add the malformed object to a linked list. After this addition, the application will process each element in the linked list. When handling the object in question, the application will explicitly trust a function pointer off of this object. If an attacker can substitute an object of their choosing in place of this function pointer, code execution under the context of the application can be achieved.

ADDITIONAL DETAILS

Patched April 12, 2011
http://www.microsoft.com/technet/security/bulletin/ms11-021.mspx


DISCLOSURE TIMELINE
  • 2010-07-20 - Vulnerability reported to vendor
  • 2011-02-07 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES