![]() The issue can be exploited via email or a specially crafted website. US-CERT advised users to not open unfamiliar or unexpected email attachments and employ Microsoft's recommended workarounds. Secunia, a Copenhagen-based vulnerability monitoring organization, ranked the flaw “extremely critical,” meaning exploits seeking to run arbitrary code are in the wild. The issue is caused by a memory corruption error when handling header information, according to FrSIRT, the French Security Incident Response Team, which ranked the flaw as “critical.” ![]() Due to limited public knowledge, risk of exploitation is limited, according to Microsoft. The Redmond, Wash.-based software giant revealed that it is aware of only targeted attacks leveraging the flaw. The flaw does not exist on Excel versions 2003 with Service Pack 3, 2007, 2007 with Service Pack 1 for Windows, and Excel 2008 for Mac, according to Microsoft. The issue exists in Excel versions 2003 with Service Pack 2, Viewer 2003, 20 for Windows, as well as Excel 2004 for Mac, according to an advisory released Tuesday by Microsoft.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |