MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300))

high Nessus Plugin ID 69833

Synopsis

It is possible to execute arbitrary code on the remote host through Microsoft Excel.

Description

The remote Windows host is running a version of Microsoft Excel that is affected by the following vulnerabilities :

- Two memory corruption vulnerabilities exist due to the way the application handles objects in memory when parsing Office files. (CVE-2013-1315 / CVE-2013-3158)

- An information disclosure vulnerability exists due to the way the application parses XML files containing external entities. (CVE-2013-3159)

If an attacker can trick a user on the affected host into opening a specially crafted Excel file, it may be possible to leverage these issues to read arbitrary files on the target system or execute arbitrary code, subject to the user's privileges.

Solution

Microsoft has released a set of patches for Excel 2003, 2007, 2010, 2013, Excel Viewer, and Office Compatibility Pack.

See Also

http://www.nessus.org/u?b5d71423

Plugin Details

Severity: High

ID: 69833

File Name: smb_nt_ms13-073.nasl

Version: 1.10

Type: local

Agent: windows

Published: 9/11/2013

Updated: 12/13/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:excel_viewer, cpe:/a:microsoft:excel, cpe:/a:microsoft:office_compatibility_pack

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 9/10/2013

Vulnerability Publication Date: 9/10/2013

Reference Information

CVE: CVE-2013-1315, CVE-2013-3158, CVE-2013-3159

BID: 62167, 62219, 62225