![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.801595 |
Categoría: | Windows |
Título: | Microsoft Office Excel Axis and Art Object Parsing RCE Vulnerabilities |
Resumen: | Microsoft Office Excel is prone to multiple remote code execution (RCE); vulnerabilities.;; This VT has been deprecated and replaced by the VT with the OID: 1.3.6.1.4.1.25623.1.0.902410. |
Descripción: | Summary: Microsoft Office Excel is prone to multiple remote code execution (RCE) vulnerabilities. This VT has been deprecated and replaced by the VT with the OID: 1.3.6.1.4.1.25623.1.0.902410. Vulnerability Insight: The flaws are due to: - An error in the usage of a specific field used for incrementing an array index. The application will copy the contents of the specified element into a statically sized buffer on the stack. - An error in parsing Office Art record, when parsing an office art object record, if an error occurs, the application will add a stray reference to an element which is part of a linked list. When receiving a window message, the application will proceed to navigate this linked list. This will access a method from the malformed object which can lead to code execution under the context of the application. Vulnerability Impact: Successful exploitation will allow attacker to execute arbitrary code, can cause memory corruption and other attacks in the context of the application through crafted Excel file. Affected Software/OS: Microsoft Office Excel 2010. Solution: No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-0978 Cert/CC Advisory: TA11-102A http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-microsoft http://zerodayinitiative.com/advisories/ZDI-11-042/ Microsoft Security Bulletin: MS11-021 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12439 http://www.securitytracker.com/id?1025337 http://secunia.com/advisories/39122 http://secunia.com/advisories/43232 http://securityreason.com/securityalert/8231 http://www.vupen.com/english/advisories/2011/0940 Common Vulnerability Exposure (CVE) ID: CVE-2011-0979 http://zerodayinitiative.com/advisories/ZDI-11-041/ http://osvdb.org/70904 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12595 http://secunia.com/advisories/43231 |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |