A vulnerability in Microsoft Excel could allow a remote attacker to execute arbitrary code on a vulnerable system.
Microsoft Excel fails to validate certain filter records contained in Excel documents. This flaw results in an unspecified memory corruption vulnerability that could allow an attacker to execute arbitrary code when Excel opens documents containing specially crafted filter records.
This vulnerability could be exploited remotely in the form of a specially crafted Excel file supplied by a web page or in an email message to the victim user. Microsoft states that in order for an attack to be successful, a victim user must manually open a malicious attachment sent in an email message.
An attacker with the ability to supply a specially crafted Microsoft Excel file could execute arbitrary code on a vulnerable system. The attacker-supplied code would be executed with the privileges of the user opening the malicious file.
Apply a patch from the vendor
This vulnerability was reported by Microsoft. Microsoft, in turn, acknowledges Greg MacManus of iDefense Labs for reporting this vulnerability to them.
This document was written by Chad R Dougherty.
|Date First Published:||2007-05-08|
|Date Last Updated:||2007-05-10 13:48 UTC|