First published: Thu Jun 16 2011(Updated: )
Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information during parsing of Excel spreadsheets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted spreadsheet, aka "Excel Improper Record Parsing Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office Excel | =2002-sp3 | |
Microsoft Office Excel | =2003-sp3 | |
Microsoft Office Excel | =2007-sp2 | |
Microsoft Office Excel | =2010 | |
Microsoft Office Excel | =2010 | |
Microsoft Office Excel Viewer | =sp2 | |
Microsoft Office | =2004 | |
Microsoft Office | =2008 | |
Microsoft Office | =2011 | |
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint | =2007-sp2 | |
Microsoft Open XML File Format Converter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1273 has a CVSS score indicating a medium severity level, making it a notable risk for affected systems.
To address CVE-2011-1273, it is recommended to update Microsoft Office and Excel to the latest available patches to mitigate vulnerabilities.
CVE-2011-1273 affects several versions of Microsoft Excel, Office for Mac, Excel Viewer, and the Office Compatibility Pack.
CVE-2011-1273 could potentially allow an attacker to execute arbitrary code if a user opens a specially crafted Excel file.
There are no known workarounds for CVE-2011-1273; applying updates is the only recommended method to secure affected systems.