- Description
- Array index vulnerability in Microsoft Office Excel 2000 SP3, 2002 SP3, and 2003 SP3; Excel Viewer 2003 Gold and SP3; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Excel spreadsheet with a NAME record that contains an invalid index value, which triggers stack corruption, aka "Excel Global Array Memory Corruption Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-399
- Hype score
- Not currently trending
- Comment
- http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Excel Global Array Memory Corruption Vulnerability - CVE-2008-4266 A remote code execution vulnerability exists in Microsoft Office Excel as a result of stack corruption when loading Excel records. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed object. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Impact
- -
- Solution
- -
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:excel:2000:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "439B26BA-376C-4D6B-B7BA-B66B8BDA8E37"
},
{
"criteria": "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "896E23B1-AB34-43FF-96F3-BA6ED7F162AF"
},
{
"criteria": "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CEBB33CD-CACF-4EB8-8B5F-8E1CB8D7A440"
},
{
"criteria": "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FDB0020C-A804-4003-B411-1AC7A6E7193E"
},
{
"criteria": "cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AE2F0B8B-0600-4324-93A9-07DBE97E1BB8"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260"
},
{
"criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E"
}
],
"operator": "OR"
}
]
}
]