{"vuid":"VU#493185","idnumber":"493185","name":"Microsoft Excel vulnerable to arbitrary code execution via malformed record","keywords":["Microsoft","Excel","Internet Explorer","arbitrary code execution","specially crafted","XLS file","unspecified opcode","ms07-jan"],"overview":"A vulnerability in Microsoft Excel may allow an attacker to execute arbitrary code on a vulnerable system.","clean_desc":"A vulnerability exists in the way Microsoft Excel handles malformed records. Per Microsoft Security Bulletin MS07-002: A remote code execution vulnerability exists in Microsoft Excel. An attacker could exploit this vulnerability when Excel parses a file and processes a malformed record.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.","resolution":"Upgrade Microsoft has issued an update to address this issue. See Microsoft Security Bulletin MS07-002 for more details. Note that Microsoft has re-released the updates in Microsoft Security Bulletin MS07-002 for Excel 2000. See the Microsoft Security Response Center blog for more information.","workarounds":"Do not open untrusted Excel documents Do not open unfamiliar or unexpected Excel or other Office documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Do not rely on file name extension filtering In most cases, Windows will call Excel to open a document even if the document has an unknown file extension. For example, if spreadsheet.qwer contains the correct file header information, Windows will open spreadsheet.qwer with Excel. Filtering for common extensions (e.g., .xls, .xlt, .csv) will not detect all Excel documents.","sysaffected":"","thanks":"Jie Ma publicly reported this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://www.microsoft.com/technet/security/Bulletin/MS07-002.mspx","http://blogs.technet.com/msrc/archive/2007/01/18/re-release-of-ms07-002-for-excel-2000.aspx","http://secunia.com/advisories/23676/","http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-30.html","http://securitytracker.com/alerts/2007/Jan/1017485.html","http://www.securityfocus.com/bid/21952"],"cveids":["CVE-2007-0028"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-09T13:10:47Z","publicdate":"2007-01-09T00:00:00Z","datefirstpublished":"2007-01-09T20:54:16Z","dateupdated":"2007-01-26T13:40:41Z","revision":25,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"5","cam_easeofexploitation":"7","cam_attackeraccessrequired":"4","cam_scorecurrent":"0.1365","cam_scorecurrentwidelyknown":"0.2415","cam_scorecurrentwidelyknownexploited":"0.4515","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.1365,"vulnote":null}