Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.801595
Kategorie:Windows
Titel:Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
Zusammenfassung:This host is installed with Microsoft Office Excel and is prone to; multiple remote code execution vulnerabilities.;; This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.902410.
Beschreibung:Summary:
This host is installed with Microsoft Office Excel and is prone to
multiple remote code execution vulnerabilities.

This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.902410.

Vulnerability Insight:
The flaws are due to:

- An error in the usage of a specific field used for incrementing an array
index. The application will copy the contents of the specified element into
a statically sized buffer on the stack.

- An error in parsing Office Art record, when parsing an office art object
record, if an error occurs, the application will add a stray reference to an
element which is part of a linked list. When receiving a window message,
the application will proceed to navigate this linked list. This will
access a method from the malformed object which can lead to code execution
under the context of the application.

Vulnerability Impact:
Successful exploitation will allow attacker to execute arbitrary
code, can cause memory corruption and other attacks in the context of the
application through crafted Excel file.

Affected Software/OS:
Microsoft Office Excel 2010.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: BugTraq ID: 46225
Common Vulnerability Exposure (CVE) ID: CVE-2011-0978
Cert/CC Advisory: TA11-102A
http://www.us-cert.gov/cas/techalerts/TA11-102A.html
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-microsoft
http://zerodayinitiative.com/advisories/ZDI-11-042/
Microsoft Security Bulletin: MS11-021
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12439
http://www.securitytracker.com/id?1025337
http://secunia.com/advisories/39122
http://secunia.com/advisories/43232
http://securityreason.com/securityalert/8231
http://www.vupen.com/english/advisories/2011/0940
Common Vulnerability Exposure (CVE) ID: CVE-2011-0979
http://zerodayinitiative.com/advisories/ZDI-11-041/
http://osvdb.org/70904
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12595
http://secunia.com/advisories/43231
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.