|
|
|
|
| |
Credit:
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-280/
|
| |
Vulnerable Systems:
* Microsoft Office Excel
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within how the application parses expressions used for determining formatting requirements. Due to the application not handling certain components of the expression correctly, the application will treat one of the structures as a different type and consequently treat one of its arguments as a pointer. This pointer is used to fetch a virtual method table and can be used to achieve code execution under the context of the application.
Patch Availability:
Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://technet.microsoft.com/en-us/security/bulletin/ms11-072
CVE Information:
CVE-2011-1989
Disclosure Timeline:
2011-06-01 - Vulnerability reported to vendor
2011-10-13 - Coordinated public release of advisory
|
|
|
|
|