{"vuid":"VU#123222","idnumber":"123222","name":"Microsoft Excel malformed graphic memory corruption vulnerability","keywords":["Microsoft Office Excel","remote command execution","MS06-012"],"overview":"Microsoft Excel contains a memory corruption vulnerability. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft Excel fails to properly validate graphics in Excel data files. When a file with a malformed graphic file is opened in Excel, system memory can be corrupted in a way that may allow an attacker to execute arbitrary code. More information is available in MS06-012.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply a patch from your vendor \nMicrosoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-012.","workarounds":"Do not access Excel files from untrusted sources By only accessing Excel files, such as spreadsheets, from trusted or known sources, the chances of exploitation are reduced.","sysaffected":"","thanks":"This issue was reported in Microsoft Security Bulletin \nMS06-012","author":"This document was written by Jeff Gennari.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","B","u","l","l","e","t","i","n","/","M","S","0","6","-","0","1","2",".","m","s","p","x"],"cveids":["CVE-2006-0030"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-03-14T19:10:25Z","publicdate":"2006-03-14T00:00:00Z","datefirstpublished":"2006-03-14T19:40:26Z","dateupdated":"2006-03-14T19:59:27Z","revision":16,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"20","cam_impact":"18","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"30.375","cam_scorecurrentwidelyknown":"40.5","cam_scorecurrentwidelyknownexploited":"81","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.375,"vulnote":null}