-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0107 Title: Microsoft Excel 'MergeCells' Record Heap Overflow Remote Code Execution Vulnerability [1] Version history: 22.08.2012 Initial publication Summary ======= Microsoft Excel is prone to a remote code-execution vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel ('.xls') file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploits will result in denial-of-service conditions. [1] CVSS v2 Base Score:9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C) [2,3] Vulnerable systems ================== Microsoft Office 2003 Service Pack 3 Microsoft Office 2007 Service Pack 2 Microsoft Office 2007 Service Pack 2 Microsoft Office 2007 Service Pack 3 Microsoft Office 2010 (32-bit editions) Microsoft Office 2010 Service Pack 1 (32-bit editions) Microsoft Office 2010 (64-bit editions) Microsoft Office 2010 Service Pack 1 (64-bit editions) Microsoft Office 2008 for Mac Microsoft Office for Mac 2011 Microsoft Excel Viewer Microsoft Office Compatibility Pack Service Pack 2 Microsoft Office Compatibility Pack Service Pack 3 Original Details ================ A remote code execution vulnerability exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. [4] What can you do? ================ The vendor has released an advisory and updates [4,5] What to tell your users? ======================== See Reference [4] below. More information ================ [1] http://www.securityfocus.com/bid/53376 [2] More information abut CVE - http://nvd.nist.gov/cvss.cfm?vectorinfo&version=2 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0185 [4] http://technet.microsoft.com/en-us/security/bulletin/ms12-030 [5] http://www.securityfocus.com/bid/53376/solution Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJQNPQxAAoJEPpzpNLI8SVoKuAP/RZ/p2mDVRD/wOAUkHNptyWK lpIcO6o7U77mpUAXTAqiJkt/+J+A2j1K05LvabJZAuFfoSnCBwFueV5/+3flN191 e8cCPr5edXs0yGSizWoW7qoOqnGE9QflEjKqniCz7F7H79Z45zNKsFUsgv62Q/zp mO/WT8nWNZR3AAoFKTOrznNQwBFOPj0xCd/SMkaEJ3/2CYyg2yVNEG5hBkWhpMog QTCIto0fGyO9lw7tU8PhfuBlVi0BiuyctSEon5A3iBFVXYF2GMWNgh/1VwwClEBl htXE1S5WOkpfetWhd5B/+UdD2z8e2nBGObY2qlwnw8G0frD2egzZBxA7HMdLZKrY 2H1piRMxazRWjzGANj3H3Seimd+TVS+dj5RBOlgFFufMjVJ2nZeyYH8E7KY4GpBy pJjHxD5sYuImYun+fsSvtjUzEJAho5mPf95Abv0vI8WRKHtk4yr2RecyvhsSZ45w KomPC9Zex3Dmy2ReYgE3+Ibo0j+XAwsd42jYtt0/AoYz9psOVz7KG4JOF8odOctw Zl7s/BFYf8YINpBaTxCRQxdYYD/zFb7z7rJqBTPiPUup1BLwmdn3V08PB1XLeRLw P206yeL0FcqaFdH8z4f8DkB0StKnYjzZbO66NNVF6wnsJNUOyR1HsKeUMzGJPCmw MVYEUziP5k1YKtINTg1k =K1IQ -----END PGP SIGNATURE-----