Microsoft Excel Vulnerability
http://jvnrss.ise.chuo-u.ac.jp/jtg/trn/en/TRTA06-167A.html
JVNRSS based Status Tracking Notes: An unspecified vulnerability in Microsoft Excel could allow an attacker to execute arbitrary code on a vulnerable system.JVNRSS-DEV projectjvn@jvn.jpTRTA06-167A2006-07-17T20:35+00:002006-06-17T03:13+00:002006-07-17T20:35+00:00Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (917285)
http://www.microsoft.com/technet/security/bulletin/ms06-037.mspx
Vulnerability Fixed (CVE-2006-1301, CVE-2006-1302, CVE-2006-1304, CVE-2006-1306, CVE-2006-1308, CVE-2006-1309, CVE-2006-2388, CVE-2006-3059)
MicrosoftMS06-037http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1301http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1302http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1304http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1306http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1308http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1309http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2388http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30592006-07-112006-07-112006-07-11[Full-disclosure] "Microsoft Office Excel 2003" Hlink Stack/SEH Overflow Exploit
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0748.html
a proof-of-concept code for this vulnerability
Full-disclosurehttp://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-27T17:30-05:002006-06-27T17:30-05:002006-06-27T17:30-05:00Microsoft Excel Vulnerabilities
http://www.jpcert.or.jp/at/2006/at060009.txt
JPCERT/CCJPCERT-AT-2006-0009http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3014http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3059http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30862006-06-23T05:59+00:002006-06-23T05:59+00:002006-06-23T05:59+00:00[Full-disclosure] MS Excel Remote Code Execution POC Exploit
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0436.html
a proof-of-concept code for this vulnerability (CVE-2006-3059)
#Cid: 18500.c
#Tested: Excel 2000 on Windows XP SP1
#Tested: Excel 2000 on Windows 2000 SP4
Full-disclosurehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30592006-06-21T23:40-05:002006-06-21T23:40-05:002006-06-21T23:40-05:00Public Exploit Code for Unpatched Vulnerability in MS Office Hyperlink Object Library
http://www.us-cert.gov/current/archive/2006/06/22/archive.html#exp4msexcl2
Vulnerability(CVE-2006-3086,VU#394444)
US-CERT is aware of publicly available exploit code for an unpatched buffer overflow vulnerability in Microsoft Hyperlink Object Library (HLINK.DLL). By persuading a user to access a specially crafted hyperlink in an email message or MS Office document, a remote attacker may be able to execute arbitrary code with the privileges of the user.
US-CERThttp://www.kb.cert.org/vuls/id/394444http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30862006-06-222006-06-222006-06-22[Full-disclosure] Microsoft Excel File Embedded Shockwave Flash Object Exploit
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html
a proof-of-concept code for this vulnerability (CVE-2006-3014)
#Cid: xls-embed-swf-expl.zip
Full-disclosurehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30142006-06-20T12:17-05:002006-06-20T12:17-05:002006-06-20T12:17-05:00New Excel 0day (Are we evolving or going in circles?)
http://isc.sans.org/diary.php?storyid=1431
Today there is news of another 0day vulnerability in Microsoft Office.
SANS Internet Storm Centerhttp://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-20T16:05+00:002006-06-20T16:05+00:002006-06-20T16:05+00:00Information on Proof of Concept posting about hlink.dll
http://blogs.technet.com/msrc/archive/2006/06/20/437826.aspx
I wanted to give you some information about the recent posting of proof of concept PERL script that claims to demonstrate a vulnerability in Excel's processing of long links. As soon as we received these reports we immediately began an investigation into the posting. I wanted to let you know information we have based on that investigation. First, I want to be clear that this proof of concept code and not an attack. We’re not aware of any attacks based on this code based on our work with our Microsoft Security Response Alliance partners. Second, our investigation so far has shown that while the posting claims this is a vulnerability in Excel, it actually is a vulnerability in hlink.dll which is a Windows component that handles operations involving hyperlinks. (snip)
Microsoft Security Response Center Bloghttp://www.us-cert.gov/cas/techalerts/TA06-167A.htmlhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30862006-06-20T11:172006-06-20T11:172006-06-20T11:17TROJ_EMBED.AN
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_EMBED.AN
Trend Microhttp://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-20T14:33+08:002006-06-20T14:33+08:002006-06-20T14:33+08:00Vulnerability in Excel Could Allow Remote Code Execution
http://www.microsoft.com/technet/security/advisory/921365.mspx
Via Microsoft Mailing List
MicrosoftMicrosoft Security Advisory (921365)http://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-192006-06-192006-06-19[Full-disclosure] ***ULTRALAME*** Microsoft Excel Unicode Overflow ***ULTRALAME***
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0391.html
a proof-of-concept code for this vulnerability (CVE-2006-3086)
#Cid: excelsexywarez.pl
Full-disclosurehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-30862006-06-18T15:50-05:002006-06-18T15:50-05:002006-06-18T15:50-05:00Microsoft Excel Vulnerability
http://www.us-cert.gov/cas/techalerts/TA06-167A.html
Via US-CERT Mailing List
US-CERTTA06-167Ahttp://www.us-cert.gov/cas/techalerts/TA06-167A.htmlhttp://www.kb.cert.org/vuls/id/8023242006-06-16T20:58-04:002006-06-16T20:58-04:002006-06-16T20:58-04:00Reports of Excel 0-Day
http://isc.sans.org/diary.php?storyid=1420
Microsoft has received a report of a new 0-day vulnerability involving Excel.
SANS Internet Storm Centerhttp://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-16T17:16+00:002006-06-16T17:16+00:002006-06-16T17:16+00:00Reports of a new vulnerability in Microsoft Excel
http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx
We've received a single report from a customer being impacted by an attack using a new vulnerability in Microsoft Excel.
Microsoft Security Response Center Bloghttp://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-16T12:092006-06-16T12:092006-06-16T12:09Active Exploitation of a Vulnerability in Microsoft Excel
http://www.us-cert.gov/current/archive/2006/06/16/archive.html#msexcel0day
US-CERT is aware of active exploitation of a new vulnerability in Microsoft Excel. Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the user running Excel.
US-CERThttp://www.us-cert.gov/cas/techalerts/TA06-167A.htmlhttp://www.kb.cert.org/vuls/id/8023242006-06-162006-06-162006-06-16Trojan.Mdropper.J
http://securityresponse.symantec.com/avcenter/venc/data/trojan.mdropper.j.html
Trojan.Mdropper.J is a Trojan horse that drops Downloader.Booli.A on the compromised computer. It exploits an undocumented vulnerability in Microsoft Excel.
Symantechttp://www.us-cert.gov/cas/techalerts/TA06-167A.html2006-06-142006-06-142006-06-14RRqi0xzt3XukveEbUWgCV2t4W98=skiQfG23OrIcw4JCquQ7onf9djk=mq55LAf7MYuxgTe6TCBDlYNFC9mUYwW0TY3+c6OVzNpfbGgJ/6nV3O1812S/NyYHvjn+4TO5jQahBisGsUBti6FUB+5WqIr9cypV7vu1lR2YLx/RLB+gpwtCIE3D75ruagu2PAlx8gfOzo4S45spyH2aOPhvRoLChlHGtgLaOXY=MIIEJTCCA46gAwIBAgIQH8+x187tRT6w02OJfpsddzANBgkqhkiG9w0BAQUFADCBzDEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxRjBEBgNVBAsTPXd3dy52ZXJpc2lnbi5jb20vcmVwb3NpdG9yeS9SUEEgSW5jb3JwLiBCeSBSZWYuLExJQUIuTFREKGMpOTgxSDBGBgNVBAMTP1ZlcmlTaWduIENsYXNzIDEgQ0EgSW5kaXZpZHVhbCBTdWJzY3JpYmVyLVBlcnNvbmEgTm90IFZhbGlkYXRlZDAeFw0wNjA2MTMwMDAwMDBaFw0wNzA2MTMyMzU5NTlaMIIBGzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxRjBEBgNVBAsTPXd3dy52ZXJpc2lnbi5jb20vcmVwb3NpdG9yeS9SUEEgSW5jb3JwLiBieSBSZWYuLExJQUIuTFREKGMpOTgxHjAcBgNVBAsTFVBlcnNvbmEgTm90IFZhbGlkYXRlZDE0MDIGA1UECxMrRGlnaXRhbCBJRCBDbGFzcyAxIC0gTWljcm9zb2Z0IEZ1bGwgU2VydmljZTEgMB4GA1UEAxQXSlZOUlNTIFJlc2VhcmNoIFByb2plY3QxHzAdBgkqhkiG9w0BCQEWEGp2bnJzc0BpcGEuZ28uanAwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANV6POygjjKOFc1uAG/YV5VpW07NCJpI3BGisMqVW8gkbU3Dk6gBCc4owM7r/JDIjJ0XmGUCMTsRCnijdbNnn9VR5tIgMhWC6p0+MeOzNQ0XOXEewfLV0nhd+7K3TgjwXNcWI02xqhv+NtD1BHzcDrkdCkGoxn/g1FgUnyhJ4Ob9AgMBAAGjgbUwgbIwCQYDVR0TBAIwADBEBgNVHSAEPTA7MDkGC2CGSAGG+EUBBxcDMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3LnZlcmlzaWduLmNvbS9ycGEwCwYDVR0PBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMEBggrBgEFBQcDAjAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3JsLnZlcmlzaWduLmNvbS9jbGFzczEuY3JsMA0GCSqGSIb3DQEBBQUAA4GBAHv9wR3h5rhh1JXN/2GBxPnBDfHUi9Jn5sfxDXvu88rNJnd4kMOhxNctZVk18/oegHdhHoxsjaNJ6v1xxpF2/u5ARoWT8TwaKnvYWwefupiTS326EY/52RVXwPtep9M02v+S2CwgF3aIKXuF5EuoR2NndxqCRUzns9AJt0qQIwmY