CVE-2006-0028
CVSS5.1
发布时间 :2006-03-14 18:02:00
修订时间 :2011-04-18 00:00:00
NMCOP    

[原文]Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via a BIFF parsing format file containing malformed BOOLERR records that lead to memory corruption, probably involving invalid pointers.


[CNNVD]Microsoft Office Excel畸形文件格式解析远程代码执行漏洞(CNNVD-200603-255)

        Microsoft Office Excel是非常流行的电子表格办公软件。
        Microsoft Office Excel在处理Excel文档中畸形解析格式时存在漏洞,攻击者可能利用此漏洞在客户机器上执行任意代码。
        使用畸形解析格式文件的Excel中存在一个远程执行代码漏洞。攻击者可以通过构建特制的Excel文件来利用此漏洞,可能允许远程执行代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:office:xp:sp3Microsoft Office XP Service Pack 3
cpe:/a:microsoft:excel:x::mac_os_x
cpe:/a:microsoft:excel:2003Microsoft Excel 2003
cpe:/a:microsoft:excel:2002Microsoft Excel 2002
cpe:/a:microsoft:excel:2000Microsoft Excel 2000
cpe:/a:microsoft:office:v.x::mac
cpe:/a:microsoft:office:2000:sp3Microsoft Office 2000 sp3
cpe:/a:microsoft:office:2003:sp2Microsoft Office 2003 sp2
cpe:/a:microsoft:excel:2004::mac_os_x
cpe:/a:microsoft:office:2004::macMicrosoft Office 2004 Mac
cpe:/a:microsoft:office:2003:sp1Microsoft Office 2003 sp1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1635Excel Viewer 2003 Remote Code Execution via Malformed File Format
oval:org.mitre.oval:def:1509Excel 2003 Remote Code Execution via Malformed File Format
oval:org.mitre.oval:def:1411Excel 2002 Remote Code Execution via Malformed File Format
oval:org.mitre.oval:def:1158Excel 2000 Remote Code Execution via Malformed File Format
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0028
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0028
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-255
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-073A.html
(VENDOR_ADVISORY)  CERT  TA06-073A
http://www.kb.cert.org/vuls/id/339878
(VENDOR_ADVISORY)  CERT-VN  VU#339878
http://www.microsoft.com/technet/security/bulletin/ms06-012.mspx
(PATCH)  MS  MS06-012
http://securitytracker.com/id?1015766
(PATCH)  SECTRACK  1015766
http://secunia.com/advisories/19138
(VENDOR_ADVISORY)  SECUNIA  19138
http://xforce.iss.net/xforce/xfdb/25225
(UNKNOWN)  XF  excel-parsing-format-file-bo(25225)
http://www.zerodayinitiative.com/advisories/ZDI-06-004.html
(UNKNOWN)  MISC  http://www.zerodayinitiative.com/advisories/ZDI-06-004.html
http://www.vupen.com/english/advisories/2006/0950
(VENDOR_ADVISORY)  VUPEN  ADV-2006-0950
http://www.securityfocus.com/archive/1/archive/1/427632/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060314 ZDI-06-004: Microsoft Excel File Format Parsing Vulnerability
http://www.osvdb.org/23899
(UNKNOWN)  OSVDB  23899
http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm
http://securityreason.com/securityalert/583
(UNKNOWN)  SREASON  583
http://secunia.com/advisories/19238
(VENDOR_ADVISORY)  SECUNIA  19238

- 漏洞信息

Microsoft Office Excel畸形文件格式解析远程代码执行漏洞
中危 未知
2006-03-14 00:00:00 2006-08-28 00:00:00
远程  
        Microsoft Office Excel是非常流行的电子表格办公软件。
        Microsoft Office Excel在处理Excel文档中畸形解析格式时存在漏洞,攻击者可能利用此漏洞在客户机器上执行任意代码。
        使用畸形解析格式文件的Excel中存在一个远程执行代码漏洞。攻击者可以通过构建特制的Excel文件来利用此漏洞,可能允许远程执行代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-012.mspx#E4EAE

- 漏洞信息 (F44663)

Technical Cyber Security Alert 2006-73A (PacketStormID:F44663)
2006-03-15 00:00:00
CERT,US-CERT  us-cert.gov
advisory,remote,denial of service,arbitrary,vulnerability
CVE-2005-4131,CVE-2006-0009,CVE-2006-0028,CVE-2006-0029,CVE-2006-0030,CVE-2006-0031
[点击下载]

Technical Cyber Security Alert TA06-073A - Microsoft has released updates that address critical vulnerabilities in Microsoft Office and Excel. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



                        National Cyber Alert System

                Technical Cyber Security Alert TA06-073A


Microsoft Office and Excel Vulnerabilities

   Original release date: March 14, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Office for Windows and Mac OS X
     * Microsoft Excel for Windows and Mac OS X
     * Microsoft Works Suite for Windows

   For more complete information, refer to the Microsoft Security
   Bulletin Summary for March 2006.


Overview

   Microsoft has released updates that address critical vulnerabilities
   in Microsoft Office and Excel. Exploitation of these vulnerabilities
   could allow a remote, unauthenticated attacker to execute arbitrary
   code or cause a denial of service on a vulnerable system.


I. Description

   Microsoft Security Bulletin Summary for March 2006 addresses
   vulnerabilities in Microsoft Office and Excel. Further information is
   available in the following US-CERT Vulnerability Notes:

   VU#339878 - Microsoft Excel malformed parsing format file memory
   corruption vulnerability 

   Microsoft Excel contains a memory corruption vulnerability. This
   vulnerability may allow a remote attacker to execute arbitrary code on
   a vulnerable system.
   (CVE-2006-0028)

   VU#104302 - Microsoft Excel malformed record memory corruption
   vulnerability 

   Microsoft Excel fails to properly validate records. This vulnerability
   may allow a remote attacker to execute arbitrary code on a vulnerable
   system.
   (CVE-2006-0031)

   VU#123222 - Microsoft Excel malformed graphic memory corruption
   vulnerability 

   Microsoft Excel fails to properly validate graphics. This
   vulnerability may allow a remote attacker to execute arbitrary code on
   a vulnerable system.
   (CVE-2006-0030)

   VU#235774 - Microsoft Excel malformed description memory corruption
   vulnerability 

   Microsoft Excel fails to properly validate the description field. This
   vulnerability may allow a remote attacker to execute arbitrary code on
   a vulnerable system.
   (CVE-2006-0029)

   VU#642428 - Microsoft Excel fails to properly perform range validation
   when parsing document files 

   Microsoft Excel contains an error in range validation, which may allow
   a remote unauthenticated, attacker to execute arbitrary code on a
   vulnerable system.
   (CVE-2005-4131)

   VU#682820 - Microsoft Office routing slip buffer overflow 

   Microsoft Office contains a buffer overflow in the parsing of routing
   slips, which may allow an attacker to execute arbitrary code on a
   vulnerable system.
   (CVE-2006-0009)


II. Impact

   A remote, unauthenticated attacker could execute arbitrary code with
   the privileges of the user. If the user is logged on with
   administrative privileges, the attacker could take complete control of
   an affected system. An attacker may also be able to cause a denial of
   service.


III. Solution

Apply Updates

   Microsoft has provided the updates for these vulnerabilities in the
   Security Bulletins and on the Microsoft Update site.


Workarounds

   Please see the following US-CERT Vulnerability Notes for workarounds.


Appendix A. References

     * Microsoft Security Bulletin Summary for March 2006 -
       <http://www.microsoft.com/technet/security/bulletin/ms06-mar.mspx>

     * US-CERT Vulnerability Note VU#339878 -
       <http://www.kb.cert.org/vuls/id/339878>

     * US-CERT Vulnerability Note VU#104302 -
       <http://www.kb.cert.org/vuls/id/104302>

     * US-CERT Vulnerability Note VU#123222 -
       <http://www.kb.cert.org/vuls/id/123222>

     * US-CERT Vulnerability Note VU#235774 -
       <http://www.kb.cert.org/vuls/id/235774>

     * US-CERT Vulnerability Note VU#642428 -
       <http://www.kb.cert.org/vuls/id/642428>

     * US-CERT Vulnerability Note VU#682820 -
       <http://www.kb.cert.org/vuls/id/682820>

     * CVE-2005-4131 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4131>

     * CVE-2006-0009 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0009>

     * CVE-2006-0028 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0028>

     * CVE-2006-0029 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0029>

     * CVE-2006-0030 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0030>

     * CVE-2006-0031 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0031>

     * Microsoft Update - <https://update.microsoft.com/microsoftupdate>


 ____________________________________________________________________
 
   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-073A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA06-073A Feedback VU#339878" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   March 14, 2006: Initial release
  
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRBdHxH0pj593lg50AQKjmwgA09ePMKZtjsxkwWaWMSFxtqGZaeV1hHby
LBApam/YAuNpmLZKzwz36quzlbceDcSeBQKKbvgqhi/Cm4Sjsywczay0agHsdXiv
dzwQCAeE0+5JA2kidsdQV9u+X866hfDq63oXy3nef/x1RPOBvNSOb8FnG1yvMCwn
965R6SUbtrA/4HRcEmVH+8dciSnARh90rcIPN6EorC7mCdXykk2YDs0MX8nuT+fl
HeHn06kvTkmJbRNZ/xq7LyGIVeuQ7Xqv1fCiqywNdJUxHg1YPmBIPqfY3e6dcqE1
rS6ithE6u9GlDMTYbTLhL3+JGE4IiIRuZL10z37x+w07AHSFuTHfWQ==
=3xcR
-----END PGP SIGNATURE-----
    

- 漏洞信息

23899
Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Private Vendor Verified

- 漏洞描述

A local overflow exists in Excel. The product fails to verify the length of BOOLERR records in the BIFF file format resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbityrary code execution resulting in a loss of integrity.

- 时间线

2006-03-14 2006-01-24
2006-03-13 2006-12-27

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, the vendor has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站