|
|
|
|
| |
Credit:
The information has been provided by Omair.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-281/
|
| |
Vulnerable Systems:
* Microsoft Office Excel
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the implementation of a record inside a Microsoft Office Excel or PowerPoint document. When parsing a signed field from this structure, the application will use the field to seek into an array of objects. Due to this unbounded index, an attacker can cause an element outside the array to be treated as a different type. This type of corruption can lead to code execution under the context of the application.
Patch Availability:
Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://technet.microsoft.com/en-us/security/bulletin/ms11-072
CVE Information:
CVE-2011-1990
Disclosure Timeline:
2011-06-01 - Vulnerability reported to vendor
2011-10-13 - Coordinated public release of advisory
|
|
|
|
|