Vulnerabilities > CVE-2007-3890 - Remote Code Execution vulnerability in Microsoft Excel and Office
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Microsoft Excel in Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a Workspace with a certain index value that triggers memory corruption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_MS07-044.NASL description The remote Mac OS X host is running a version of Microsoft Office 2004 for Mac that is affected by several vulnerabilities. If an attacker can trick a user on the affected host into opening a specially crafted Office file or viewing a specially crafted web page, these issues could be leveraged to execute arbitrary code subject to the user last seen 2019-10-28 modified 2010-10-20 plugin id 50053 published 2010-10-20 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/50053 title MS07-043 / MS07-044: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (921503 / 940965) (Mac OS X) code #TRUSTED 30ffbe8bf20a83cdbad5110e2d3fd711db540c9cab0afbb129917dfde9a8484d3996e6f44905bd6578c5fea59c2b0eaff783746aa083f12f03731dd87d70c9519513869f683a3e63d7b0ca942c83d5ae2649e1d0d256c927325f68ff12e5901d14e147f2df90d83bf08e67a58b787fec2c90b2db230f030483700ca9747163b22be5e6a409d60225bf6f49381448abbb71fe97cf839ce07f1f8a8225af701b60168e59c7b78f028ea115d1de8f71972af01ea3abf22eae5945591fedfc49f5b276331be420fcc7a1b0ef29337da7e15c64d27fe3969710885392b555ba9c8d98a1a26c8d9c44f325dafbc5cec0c4be2ae9d86abd9ccd851d43d5dc3c073b23cfd726d0eb14b7828436c5667635c81a0d62b3690b1bb844ccb2bd39697dd70206d9f190d5141a188cd783ba61c42f433c6e4fc1bf007a40d9d46b668aea4b57d4e2497ea286239ece9e59e7f3decd46b2a937a82c3b54dc2c1cd02f9077aa5c1e74716302897a308916f8c71f80f4ce79d455759a3121cefadd5dc370c589af42d9a355f9f7d1ca7dfbcc22fe027fee6d82fdde47b99e98e048c4135da63d10ddd25c4ece998ee897355f2cb6b62a80089a5e0dd1fd165b44ab166452d4d2e41bd768587653a6fe540102b9bed25dab75d9c53ef52fbba029dbb28c1ce23ca0880c460b3f755432395e1dfe3d7dac4e4d3d55955173b53cbc0d2281f0449252dc # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(50053); script_version("1.18"); script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/14"); script_cve_id("CVE-2007-2224", "CVE-2007-3890"); script_bugtraq_id(25280, 25282); script_xref(name:"MSFT", value:"MS07-043"); script_xref(name:"MSFT", value:"MS07-044"); script_xref(name:"MSKB", value:"921503"); script_xref(name:"MSKB", value:"940965"); script_name(english:"MS07-043 / MS07-044: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (921503 / 940965) (Mac OS X)"); script_summary(english:"Check version of Microsoft Office"); script_set_attribute(attribute:"synopsis", value: "An application installed on the remote Mac OS X host is affected by multiple remote code execution vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote Mac OS X host is running a version of Microsoft Office 2004 for Mac that is affected by several vulnerabilities. If an attacker can trick a user on the affected host into opening a specially crafted Office file or viewing a specially crafted web page, these issues could be leveraged to execute arbitrary code subject to the user's privileges."); script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms07-043"); script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms07-044"); script_set_attribute(attribute:"solution", value:"Microsoft has released a patch for Office 2004 for Mac."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(119,189); script_set_attribute(attribute:"vuln_publication_date", value:"2007/08/14"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/10/20"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2004::mac"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/MacOSX/packages"); exit(0); } include("misc_func.inc"); include("ssh_func.inc"); include("macosx_func.inc"); if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS) enable_ssh_wrappers(); else disable_ssh_wrappers(); function exec(cmd) { local_var buf, ret; if (islocalhost()) buf = pread(cmd:"/bin/bash", argv:make_list("bash", "-c", cmd)); else { ret = ssh_open_connection(); if (!ret) exit(1, "ssh_open_connection() failed."); buf = ssh_cmd(cmd:cmd); ssh_close_connection(); } return buf; } packages = get_kb_item("Host/MacOSX/packages"); if (!packages) exit(0, "The 'Host/MacOSX/packages' KB item is missing."); uname = get_kb_item("Host/uname"); if (!uname) exit(1, "The 'Host/uname' KB item is missing."); if (!egrep(pattern:"Darwin.*", string:uname)) exit(1, "The host does not appear to be using the Darwin sub-system."); # Gather version info. info = ''; installs = make_array(); prod = 'Office 2004 for Mac'; cmd = GetCarbonVersionCmd(file:"Microsoft Component Plugin", path:"/Applications/Microsoft Office 2004/Office"); version = exec(cmd:cmd); if (version && version =~ "^[0-9]+\.") { version = chomp(version); if (version !~ "^11\.") exit(1, "Failed to get the version for "+prod+" - '"+version+"'."); installs[prod] = version; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); fixed_version = '11.3.7'; fix = split(fixed_version, sep:'.', keep:FALSE); for (i=0; i<max_index(fix); i++) fix[i] = int(fix[i]); for (i=0; i<max_index(fix); i++) if ((ver[i] < fix[i])) { info += '\n Product : ' + prod + '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version + '\n'; break; } else if (ver[i] > fix[i]) break; } # Report findings. if (info) { gs_opt = get_kb_item("global_settings/report_verbosity"); if (gs_opt && gs_opt != 'Quiet') security_hole(port:0, extra:info); else security_hole(0); exit(0); } else { if (max_index(keys(installs)) == 0) exit(0, "Office 2004 for Mac is not installed."); else { msg = 'The host has '; foreach prod (sort(keys(installs))) msg += prod + ' ' + installs[prod] + ' and '; msg = substr(msg, 0, strlen(msg)-1-strlen(' and ')); msg += ' installed and thus is not affected.'; exit(0, msg); } }
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS07-044.NASL description The remote host is running a version of Microsoft Excel that is affected by various flaws that may allow arbitrary code to be run. To succeed, the attacker would have to send a rogue file to a user of the remote computer and have it open it with Microsoft Excel. last seen 2020-06-01 modified 2020-06-02 plugin id 25882 published 2007-08-14 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25882 title MS07-044: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (940965)
Oval
accepted | 2012-05-28T04:01:31.255-04:00 | ||||||||||||||||
class | vulnerability | ||||||||||||||||
contributors |
| ||||||||||||||||
definition_extensions |
| ||||||||||||||||
description | Microsoft Excel in Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a Workspace with a certain index value that triggers memory corruption. | ||||||||||||||||
family | windows | ||||||||||||||||
id | oval:org.mitre.oval:def:2149 | ||||||||||||||||
status | accepted | ||||||||||||||||
submitted | 2007-08-15T12:17:00 | ||||||||||||||||
title | Workspace Memory Corruption Vulnerability | ||||||||||||||||
version | 12 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 25280 CVE(CAN) ID: CVE-2007-3890 Microsoft Excel是微软Office套件中的电子表格工具。 Excel在处理畸形格式的文档时存在漏洞,远程攻击者可能利用此漏洞通过诱使用户处理恶意文件控制用户系统。 Excel没有正确地验证rtWnDesk记录中的索引值,如果用户受骗打开了特制的Excel Workspace(XLW)文件的话,就可以触发内存破坏,导致执行任意指令。 Microsoft Excel Viewer 2003 Microsoft Office XP SP3 Microsoft Office 2004 for Mac Microsoft Office 2003 Service Pack 2 Microsoft Office 2000 SP3 临时解决方法: * 使用Microsoft Office文件阻断策略禁止打开不可信任来源和位置的Office 2003及更早版本文档: Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Excel\Security\FileOpenBlock] "BinaryFiles"=dword:00000001. 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS07-044)以及相应补丁: MS07-044:Vulnerability in Microsoft Excel Could Allow Remote Code Execution (940965) 链接:<a href="http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx?pf=true" target="_blank">http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx?pf=true</a> |
id | SSV:2116 |
last seen | 2017-11-19 |
modified | 2007-08-17 |
published | 2007-08-17 |
reporter | Root |
title | Microsoft Excel rtWnDesk记录内存破坏漏洞(MS07-044) |
References
- http://secunia.com/advisories/26145
- http://www.securityfocus.com/bid/25280
- http://www.securitytracker.com/id?1018561
- http://www.us-cert.gov/cas/techalerts/TA07-226A.html
- http://www.vupen.com/english/advisories/2007/2868
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-044
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2149