Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:XLS-DBORPARAMQRY

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Office Excel DbOrParamQry Record Parsing Memory Corruption

Release Date

2010/10/19

Update Number

1794

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Office Excel DbOrParamQry Record Parsing Memory Corruption


This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Office Excel. It is due to a flaw while parsing DbOrParamQry records. Remote attackers can exploit this by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user. In a successful attack, where arbitrary code is injected and executed on the target machine, the behavior of the target is dependent on the logic of the malicious code. In an unsuccessful attack, the vulnerable application can terminate.

Extended Description

Microsoft Excel is prone to a remote code-execution vulnerability. Attackers can exploit this issue by enticing victims to open a specially crafted Excel ('.xls') file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application.

Affected Products

  • Microsoft Excel 2002 SP1
  • Microsoft Excel 2002 SP2
  • Microsoft Excel 2002 SP3
  • Microsoft Excel 2002
  • Microsoft Excel 2004 for Mac
  • Microsoft Excel 2008 for Mac
  • Microsoft Open XML File Format Converter for Mac

References

  • BugTraq: 38555
  • CVE: CVE-2010-0264

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out