Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:XLS-SELECTION

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Excel Malformed Selection Record Remote Code Execution

Release Date

2011/06/13

Update Number

1937

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Excel Malformed Selection Record Remote Code Execution


This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft Excel is prone to a remote code-execution vulnerability. Successfully exploiting this issue allows attackers to corrupt process memory and to execute arbitrary code in the context of targeted users. Note that Microsoft Office applications include functionality to embed Office files as objects contained in other Office files. As an example, Microsoft Word files may contain embedded malicious Microsoft Excel files, making Word documents another possible attack vector.

Affected Products

  • Microsoft Excel 2000 SP2
  • Microsoft Excel 2000 SP3
  • Microsoft Excel 2000 SR1
  • Microsoft Excel 2000
  • Microsoft Excel 2002 SP1
  • Microsoft Excel 2002 SP2
  • Microsoft Excel 2002 SP3
  • Microsoft Excel 2002
  • Microsoft Excel 2003 SP1
  • Microsoft Excel 2003 SP2
  • Microsoft Excel 2003
  • Microsoft Excel 2004 for Mac
  • Microsoft Excel x for Mac
  • Microsoft Office Excel Viewer 2003

References

  • BugTraq: 18885
  • BugTraq: 18885
  • CVE: CVE-2011-1277
  • CVE: CVE-2006-1302

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out