First published: Tue Jun 08 2010(Updated: )
Microsoft Office Excel 2002 SP3, 2007 SP1, and SP2; Office 2004 for mac; Office 2008 for Mac; Open XML File Format Converter for Mac; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2; allows remote attackers to execute arbitrary code via an Excel file with crafted DBQueryExt records that allow a function call to a "user-controlled pointer," aka "Excel ADO Object Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office Excel | =2007-sp2 | |
Microsoft Office Excel | =2007-sp1 | |
Microsoft Office Excel | =2002-sp3 | |
Microsoft Open XML File Format Converter | ||
Microsoft Office | =2008 | |
Microsoft Office | =2004 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =2007-sp2 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =2007-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1253 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2010-1253, users should apply the latest patches and updates provided by Microsoft for the affected Office versions.
CVE-2010-1253 affects Microsoft Excel 2002 SP3, 2007 SP1 and SP2, Office 2004 for Mac, Office 2008 for Mac, and related compatibility packs.
CVE-2010-1253 facilitates remote attackers to execute arbitrary code through specially crafted Excel files.
While updating software is the best mitigation for CVE-2010-1253, users can also avoid opening untrusted Excel files to reduce risk.