Short Name |
HTTP:STC:DL:XLS-WORKSPACE-DES |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Excel Workbook Workspace Designation Handling Code Execution |
Release Date |
2010/10/12 |
Update Number |
1790 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known memory corruption vulnerability in the way Microsoft Excel processes files. An attack targeting this can result in the injection and execution of code. If code execution is successful, the behavior of the target depends on the intention of the attacker. Any code injected is executed within the security context of the currently logged in user. In an unsuccessful attack, Excel terminates resulting in the loss of any unsaved data from the current session.
Microsoft Excel is prone to a remote code-execution vulnerability. Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file (.xls). Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. This may facilitate a compromise of vulnerable computers.