15 December 2015

ZDI released information about unpatched critical vulnerability in Microsoft Excel 2007/2010/2013

ZDI released information about unpatched critical vulnerability in Microsoft Excel 2007/2010/2013

Use-after-free error was disclosed in Microsoft Office Excel 2007, 2010 and 2013. The vulnerability allows remote code execution when the victim opens a malicious .xlsb file. This file can be delivered via email or during internet surfing.

The vulnerability was disclosed by Zero Day Initiative, a security company recently acquired by HP. ZDI-15-639 contains brief description of this vulnerability.

PoC code is available on GitHub. Detailed explanation of this vulnerability can be found here.

We have tested the provided PoC codes against Microsoft Excel 2013 and confirm successful crash of Microsoft Excel. Further investigation may show if the vulnerability could be used to execute arbitrary code in the latest version of Microsoft Office.

Our analysis shows that, combined with recent generic ASLR bypass in Microsoft Office and publicly disclosed PoC codes, public exploitation of this vulnerability is highly possible in the nearest future.

Back to the list

Latest Posts

Microsoft patches for June 2018

Microsoft patches for June 2018

50 vulnerabilities patched, some of them are potentially wormable.
13 June 2018
VPNFilter, attacks on routers and why external scanning is essential for security

VPNFilter, attacks on routers and why external scanning is essential for security

How to protect your router from VPNFilter and other attacks.
8 June 2018
New zero-day in Adobe Flash Player heavily exploited in the Middle East

New zero-day in Adobe Flash Player heavily exploited in the Middle East

Users in Doha and Qatar suffered from a targeted attack.
7 June 2018