First published: Wed Apr 13 2011(Updated: )
Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted 400h substream in an Excel file, which triggers a stack-based buffer overflow, aka "Excel Integer Overrun Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Open XML File Format Converter | ||
Microsoft Office | =2008 | |
Microsoft Office | =2004 | |
Microsoft Office Excel | ||
Microsoft Office Excel | =2007-sp2 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =2007-sp2 | |
Microsoft Office Excel Viewer | =sp2 | |
Microsoft Office Excel | =2010 | |
Microsoft Office Excel | =2002-sp3 | |
Microsoft Office Excel | =2003-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0097 is classified as a critical vulnerability that allows remote code execution.
To mitigate CVE-2011-0097, users should update their Microsoft Office and Excel applications to the latest available service packs.
CVE-2011-0097 affects multiple versions of Microsoft Excel, Office for Mac, and the Open XML File Format Converter.
Yes, CVE-2011-0097 can be exploited remotely by attackers through specially crafted Excel files.
Exploitation of CVE-2011-0097 can lead to arbitrary code execution on the victim's system, compromising system integrity.