-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2011.0410
        Vulnerabilities in Microsoft Excel Could Allow Remote Code
                            Execution (2489279)
                               13 April 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Office XP Service Pack 3
                   Microsoft Office 2003 Service Pack 3
                   Microsoft Office 2007 Service Pack 2
                   Microsoft Office 2010
                   Microsoft Office 2004 for Mac
                   Microsoft Office 2008 for Mac
                   Microsoft Office for Mac 2011
                   Open XML File Format Converter for Mac
                   Microsoft Excel Viewer Service Pack 2
                   Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
Publisher:         Microsoft
Operating System:  Windows
                   Mac OS X
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2011-0980 CVE-2011-0979 CVE-2011-0978
                   CVE-2011-0105 CVE-2011-0104 CVE-2011-0103
                   CVE-2011-0101 CVE-2011-0098 CVE-2011-0097

Original Bulletin: 
   http://www.microsoft.com/technet/security/Bulletin/MS11-021.mspx

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS11-021 - Important
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2489279)
Version: 1.0

General Information

Executive Summary

This security update resolves nine privately reported vulnerabilities in 
Microsoft Office. The vulnerabilities could allow remote code execution if a 
user opens a specially crafted Excel file. An attacker who successfully 
exploited any of these vulnerabilities could gain the same user rights as the 
logged-on user. Users whose accounts are configured to have fewer user rights 
on the system could be less impacted than users who operate with 
administrative user rights.

This security update is rated Important for all supported editions of Microsoft 
Excel 2002, Microsoft Excel 2003, Microsoft Excel 2007, Microsoft Excel 2010, 
Microsoft Office 2004 for Mac, Microsoft Office 2008 for Mac, and Microsoft 
Office for Mac 2011; Open XML File Format Converter for Mac; and all supported 
versions of Microsoft Office Excel Viewer and Microsoft Office Compatibility 
Pack. For more information, see the subsection, Affected and Non-Affected 
Software, in this section.

Affected Software 

Microsoft Office XP Service Pack 3
Microsoft Office 2003 Service Pack 3
Microsoft Office 2007 Service Pack 2
Microsoft Office 2010 (32-bit editions)
Microsoft Office 2010 (64-bit editions)
Microsoft Office 2004 for Mac
Microsoft Office 2008 for Mac
Microsoft Office for Mac 2011
Open XML File Format Converter for Mac
Microsoft Excel Viewer Service Pack 2
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File 
  Formats Service Pack 2

Vulnerability Information

Excel Integer Overrun Vulnerability - CVE-2011-0097

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Heap Overflow Vulnerability - CVE-2011-0098

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Record Parsing WriteAV Vulnerability - CVE-2011-0101

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Memory Corruption Vulnerability - CVE-2011-0103

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Buffer Overwrite Vulnerability - CVE-2011-0104

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Data Initialization Vulnerability - CVE-2011-0105

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Array Indexing Vulnerability - CVE-2011-0978

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Linked List Corruption Vulnerability - CVE-2011-0979

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

Excel Dangling Pointer Vulnerability - CVE-2011-0980

A remote code execution vulnerability exists in the way that Microsoft Excel 
handles specially crafted Excel files. An attacker who successfully exploited 
this vulnerability could take complete control of an affected system. An 
attacker could then install programs; view, change, or delete data; or create 
new accounts with full user rights.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFNpNbD/iFOrG6YcBERAsyGAKDRV+Hm6U7LRql1XuR1Z7O+yhL3uwCfQemT
40gig3fMsdNpUAobhrwWJb8=
=9/Dr
-----END PGP SIGNATURE-----