|
|
|
|
| |
Credit:
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-103/
|
| |
Vulnerable Systems:
* Microsoft Office Excel
User interaction is required in that a target must visit a malicious page or open a malicious file.The specific flaw exists in the parsing of DBQueryExt records in an Excel spreadsheet. Due to the lack of checking when parsing particular fields within the structure, it is possible to get a user-controlled pointer to be called. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.
Patch Availability:
Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://www.microsoft.com/technet/security/bulletin/ms10-038.mspx
CVE Information:
CVE-2010-1253
Disclosure Timeline:
2010-01-06 - Vulnerability reported to vendor
2010-06-08 - Coordinated public release of advisory
|
|
|
|
|