Vulnerabilities > CVE-2011-1986 - Resource Management Errors vulnerability in Microsoft Excel 2003
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Use-after-free vulnerability in Microsoft Excel 2003 SP3 allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Use after Free WriteAV Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS11-072 |
bulletin_url | |
date | 2011-09-13T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2587505 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution |
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_11_PUPPET-120411.NASL description This update fixes the following issues : - Filebucket arbitrary file read. (CVE-2011-1986) - Filebucket DoS. (CVE-2012-1987) - Filebucket arbitrary code execution. (CVE-2012-1988) - insecure handling of temporary files. (CVE-2012-1989) last seen 2020-06-05 modified 2013-01-25 plugin id 64217 published 2013-01-25 reporter This script is Copyright (C) 2013-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/64217 title SuSE 11.1 Security Update : puppet (SAT Patch Number 6115) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SuSE 11 update information. The text itself is # copyright (C) Novell, Inc. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(64217); script_version("1.8"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2011-1986", "CVE-2012-1986", "CVE-2012-1987", "CVE-2012-1988", "CVE-2012-1989"); script_name(english:"SuSE 11.1 Security Update : puppet (SAT Patch Number 6115)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 11 host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update fixes the following issues : - Filebucket arbitrary file read. (CVE-2011-1986) - Filebucket DoS. (CVE-2012-1987) - Filebucket arbitrary code execution. (CVE-2012-1988) - insecure handling of temporary files. (CVE-2012-1989)" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=755726" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=755869" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=755870" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=755871" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=755872" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2011-1986.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-1986.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-1987.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-1988.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-1989.html" ); script_set_attribute(attribute:"solution", value:"Apply SAT patch number 6115."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:puppet"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:puppet-server"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11"); script_set_attribute(attribute:"patch_publication_date", value:"2012/04/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/25"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11"); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu); pl = get_kb_item("Host/SuSE/patchlevel"); if (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, "SuSE 11.1"); flag = 0; if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"puppet-2.6.12-0.14.1")) flag++; if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"puppet-2.6.12-0.14.1")) flag++; if (rpm_check(release:"SLES11", sp:1, reference:"puppet-2.6.12-0.14.1")) flag++; if (rpm_check(release:"SLES11", sp:1, reference:"puppet-server-2.6.12-0.14.1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS11-072.NASL description The remote Windows host is running a version of Microsoft Office, Excel, or a related product that is affected by several vulnerabilities. If an attacker can trick a user on the affected host into opening a specially crafted Excel file, he could leverage this issue to execute arbitrary code subject to the user last seen 2020-06-01 modified 2020-06-02 plugin id 56175 published 2011-09-14 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/56175 title MS11-072: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2587505) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(56175); script_version("1.22"); script_cvs_date("Date: 2018/11/15 20:50:31"); script_cve_id( "CVE-2011-1986", "CVE-2011-1987", "CVE-2011-1988", "CVE-2011-1989", "CVE-2011-1990" ); script_bugtraq_id(49476, 49477, 49478, 49517, 49518); script_xref(name:"MSFT", value:"MS11-072"); script_xref(name:"MSKB", value:"2553070"); script_xref(name:"MSKB", value:"2553072"); script_xref(name:"MSKB", value:"2553073"); script_xref(name:"MSKB", value:"2553074"); script_xref(name:"MSKB", value:"2553075"); script_xref(name:"MSKB", value:"2553089"); script_xref(name:"MSKB", value:"2553090"); script_xref(name:"MSKB", value:"2553091"); script_xref(name:"MSKB", value:"2553093"); script_xref(name:"MSKB", value:"2553094"); script_xref(name:"MSKB", value:"2553095"); script_xref(name:"MSKB", value:"2553096"); script_name(english:"MS11-072: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2587505)"); script_summary(english:"Checks versions of Excel, oart.dll, oartconv.dll, etc"); script_set_attribute(attribute:"synopsis", value: "Arbitrary code can be executed on the remote host through Microsoft Office."); script_set_attribute(attribute:"description", value: "The remote Windows host is running a version of Microsoft Office, Excel, or a related product that is affected by several vulnerabilities. If an attacker can trick a user on the affected host into opening a specially crafted Excel file, he could leverage this issue to execute arbitrary code subject to the user's privileges."); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-280/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-281/"); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-072"); script_set_attribute(attribute:"solution", value: "Microsoft has released a set of patches for Office 2003, 2007, 2010, Excel Viewer, Office Compatability Pack, Excel Services, and Excel Web App."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2011/09/13"); script_set_attribute(attribute:"patch_publication_date", value:"2011/09/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/09/14"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:excel:2007"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:excel:2010"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:excel_viewer"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows : Microsoft Bulletins"); script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc."); script_dependencies("smb_nt_ms02-031.nasl", "office_installed.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl"); script_require_keys("SMB/MS_Bulletin_Checks/Possible"); script_require_ports(139, 445, 'Host/patch_management_checks'); exit(0); } include("smb_hotfixes_fcheck.inc"); include("smb_hotfixes.inc"); include("smb_func.inc"); include("misc_func.inc"); include("audit.inc"); get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible"); bulletin = 'MS11-072'; kbs = make_list("2553070", "2553072", "2553073", "2553074", "2553075", "2553089", "2553090", "2553091", "2553093", "2553094", "2553095", "2553096"); if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE); info = ""; vuln = FALSE; # Excel. installs = get_kb_list("SMB/Office/Excel/*/ProductPath"); if (!isnull(installs)) { foreach install (keys(installs)) { version = install - 'SMB/Office/Excel/' - '/ProductPath'; path = installs[install]; if (isnull(path)) path = 'n/a'; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); # Excel 2010. office_sp = get_kb_item("SMB/Office/2010/SP"); if ( (!isnull(office_sp) && (office_sp == 0 || office_sp == 1)) && ( (ver[0] == 14 && ver[1] == 0 && ver[2] < 6106) || (ver[0] == 14 && ver[1] == 0 && ver[2] == 6106 && ver[3] < 5005) ) ) { info = '\n Product : Excel 2010' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 14.0.6106.5005\n'; hotfix_add_report(info, bulletin:bulletin, kb:'2553070'); } # Excel 2007. office_sp = get_kb_item("SMB/Office/2007/SP"); if ( (!isnull(office_sp) && office_sp == 2) && ( (ver[0] == 12 && ver[1] == 0 && ver[2] < 6565) || (ver[0] == 12 && ver[1] == 0 && ver[2] == 6565 && ver[3] < 5003) ) ) { info = '\n Product : Excel 2007' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 12.0.6565.5003\n'; hotfix_add_report(info, bulletin:bulletin, kb:'2553073'); } # Excel 2003. office_sp = get_kb_item("SMB/Office/2003/SP"); if ((!isnull(office_sp) && office_sp == 3) && (ver[0] == 11 && ver[1] == 0 && ver[2] < 8341)) { info = '\n Product : Excel 2003' + '\n File : ' + path + '\n Installed version : ' + version + '\n Fixed version : 11.0.8341.0\n'; hotfix_add_report(info, bulletin:bulletin, kb:'2553072'); } } } # Excel Viewer. installs = get_kb_list("SMB/Office/ExcelViewer/*/ProductPath"); if (!isnull(installs)) { foreach install (keys(installs)) { version = install - 'SMB/Office/ExcelViewer/' - '/ProductPath'; path = installs[install]; if (isnull(path)) path = 'n/a'; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); # Excel Viewer. if ( ver[0] == 12 && ver[1] == 0 && ( ver[2] < 6565 || (ver[2] == 6565 && ver[3] < 5000) ) ) { info = '\n Product : Excel Viewer' + '\n File : '+ path + '\n Installed version : '+ version + '\n Fixed version : 12.0.6565.5000\n'; hotfix_add_report(info, bulletin:bulletin, kb:'2553075'); } } } # 2007 Microsoft Office system and the Microsoft Office Compatibility Pack. installs = get_kb_list("SMB/Office/ExcelCnv/*/ProductPath"); if (!isnull(installs)) { foreach install (keys(installs)) { version = install - 'SMB/Office/ExcelCnv/' - '/ProductPath'; path = installs[install]; if (isnull(path)) path = 'n/a'; ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); # 2007 Office system and the Office Compatibility Pack. if ( ver[0] == 12 && ver[1] == 0 && ( ver[2] < 6565 || (ver[2] == 6565 && ver[3] < 5003) ) ) { info = '\n Product : 2007 Office system and the Office Compatibility Pack' + '\n File : '+ path + '\n Installed version : '+ version + '\n Fixed version : 12.0.6565.5003\n'; hotfix_add_report(info, bulletin:bulletin, kb:'2553074'); } } } # Figure out where SharePoint Server is installed or *might be* installed. arch = get_kb_item_or_exit("SMB/ARCH"); sps2007_path = NULL; sps2007_std = FALSE; sps2010_path = NULL; port = kb_smb_transport(); login = kb_smb_login(); pass = kb_smb_password(); domain = kb_smb_domain(); if(! smb_session_init()) audit(AUDIT_FN_FAIL, "smb_session_init"); hcf_init = TRUE; rc = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$"); if (rc != 1) { NetUseDel(); audit(AUDIT_SHARE_FAIL, "IPC$"); } hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE); if (isnull(hklm)) { NetUseDel(); audit(AUDIT_REG_FAIL); } key = "SOFTWARE\Microsoft\Office Server\12.0"; key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED); if (!isnull(key_h)) { item = RegQueryValue(handle:key_h, item:"InstallPath"); if (!isnull(item)) { sps2007_path = item[1]; sps2007_path = ereg_replace(pattern:"^(.+)\\$", replace:"\1", string:sps2007_path); } item = RegQueryValue(handle:key_h, item:"OfficeServerPremium"); if (!isnull(item)) { office_server_premium = item[1]; if (office_server_premium == 0) sps2007_std = TRUE; } RegCloseKey(handle:key_h); } if (isnull(sps2007_path)) sps2007_path = hotfix_get_programfilesdir() + "\Microsoft Office Servers\12.0"; key = "SOFTWARE\Microsoft\Office Server\14.0"; key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED); if (!isnull(key_h)) { item = RegQueryValue(handle:key_h, item:"InstallPath"); if (!isnull(item)) { sps2010_path = item[1]; sps2010_path = ereg_replace(pattern:"^(.+)\\$", replace:"\1", string:sps2010_path); } RegCloseKey(handle:key_h); } if (isnull(sps2010_path)) sps2010_path = hotfix_get_programfilesdir() + "\Microsoft Office Servers\14.0"; RegCloseKey(handle:hklm); NetUseDel(close:FALSE); # Excel Web App 2010. # # nb: webapp2010_path must be defined before 'sps2010_path' is updated. webapp2010_path = sps2010_path + "\WebServices\ConversionService\Bin\Converter\1003"; if ( hotfix_check_fversion(path:webapp2010_path, file:"Xlsrvintl.dll", version:"14.0.6106.5005", min_version:"14.0.0.0", bulletin:bulletin, kb:'2553095') == HCF_OLDER ) vuln = TRUE; # Excel Services in SharePoint Server 2007. sps2007_path += "\bin"; if ( sps2007_std == FALSE && hotfix_check_fversion(path:sps2007_path, file:"Xlsrv.dll", version:"12.0.6565.5000", min_version:"12.0.0.0", bulletin:bulletin, kb:'2553093') == HCF_OLDER ) vuln = TRUE; # Excel Services in SharePoint Server 2010 sps2010_path += "\bin"; if ( hotfix_check_fversion(path:sps2010_path, file:"Xlsrv.dll", version:"14.0.6106.5005", min_version:"14.0.0.0", bulletin:bulletin, kb:'2553094') == HCF_OLDER ) vuln = TRUE; # Office office_ver = hotfix_check_office_version(); x86_path = hotfix_get_commonfilesdir(); x64_path = hotfix_get_programfilesdirx86(); # - Office 2010 if (office_ver && office_ver['14.0']) { office_sp = get_kb_item("SMB/Office/2010/SP"); if (!isnull(office_sp) && office_sp <= 1) { kb = '2553091'; if ( (x86_path && hotfix_is_vulnerable(file:"Oart.dll", version:"14.0.6106.5005", min_version:'14.0.0.0', path:x86_path + "\Microsoft Shared\Office14", bulletin:bulletin, kb:kb)) || (x64_path && hotfix_is_vulnerable(file:"Oart.dll", arch:"x64", version:"14.0.6106.5005", min_version:'14.0.0.0', path:x64_path + "\Common Files\Microsoft Shared\Office14", bulletin:bulletin, kb:kb)) ) vuln = TRUE; kb = '2553096'; if ( (x86_path && hotfix_is_vulnerable(file:"Oartconv.dll", version:"14.0.6106.5005", min_version:'14.0.0.0', path:x86_path + "\Microsoft Shared\Office14", bulletin:bulletin, kb:kb)) || (x64_path && hotfix_is_vulnerable(file:"Oartconv.dll", arch:"x64", version:"14.0.6106.5005", min_version:'14.0.0.0', path:x64_path + "\Common Files\Microsoft Shared\Office14", bulletin:bulletin, kb:kb)) ) vuln = TRUE; } } # - Office 2007 # # nb: footnote #1 in MS11-072 says KB2553074 needs to be installed # too with Office 2007, but we checked for that earlier in the # plugin. else if (office_ver && office_ver['12.0']) { office_sp = get_kb_item("SMB/Office/2007/SP"); if (!isnull(office_sp) && office_sp == 2) { kb = '2553089'; if ( (x86_path && hotfix_is_vulnerable(file:"Oart.dll", version:"12.0.6565.5000", min_version:'12.0.0.0', path:x86_path + "\Microsoft Shared\Office12", bulletin:bulletin, kb:kb)) || (x64_path && hotfix_is_vulnerable(file:"Oart.dll", arch:"x64", version:"12.0.6565.5000", min_version:'12.0.0.0', path:x64_path + "\Common Files\Microsoft Shared\Office12", bulletin:bulletin, kb:kb)) ) vuln = TRUE; kb = '2553090'; if ( (x86_path && hotfix_is_vulnerable(file:"Oartconv.dll", version:"12.0.6565.5000", min_version:'12.0.0.0', path:x86_path + "\Microsoft Shared\Office12", bulletin:bulletin, kb:kb)) || (x64_path && hotfix_is_vulnerable(file:"Oartconv.dll", arch:"x64", version:"12.0.6565.5000", min_version:'12.0.0.0', path:x64_path + "\Common Files\Microsoft Shared\Office12", bulletin:bulletin, kb:kb)) ) vuln = TRUE; } } if (info || vuln) { set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE); hotfix_security_hole(); } else audit(AUDIT_HOST_NOT, 'affected');
Oval
accepted | 2012-05-28T04:00:20.095-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Use-after-free vulnerability in Microsoft Excel 2003 SP3 allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Use after Free WriteAV Vulnerability." | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:12345 | ||||||||
status | accepted | ||||||||
submitted | 2011-09-14T13:00:00 | ||||||||
title | Excel Use after Free WriteAV Vulnerability | ||||||||
version | 7 |