Integer overflow in the REPT function in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office SharePoint Server 2007 Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file containing a formula within a cell, aka "Formula Parsing Vulnerability."
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=122479227205998&w=2 | Issue Tracking Mailing List Third Party Advisory |
http://secunia.com/advisories/32211 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/31706 | Patch Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1021044 | Third Party Advisory VDB Entry |
http://www.us-cert.gov/cas/techalerts/TA08-288A.html | Third Party Advisory US Government Resource |
http://www.vupen.com/english/advisories/2008/2808 | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45580 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45581 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6102 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Feb 2022, 19:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:sp1:*:*:*:*:* cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:* cpe:2.3:a:microsoft:office_sharepoint_server:2007:*:*:*:*:*:*:* cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:* cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:* cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:office_excel_viewer:2003:*:*:*:*:*:*:* cpe:2.3:a:microsft:open_xml_file_format_converter:unknown:mac:*:*:*:*:*:* cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:office_sharepoint_server:2007:unknown:x64:*:*:*:*:* cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:* |
cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:* cpe:2.3:a:microsoft:sharepoint_server:2007:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:excel_viewer:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:sharepoint_server:2007:-:*:*:*:*:*:* cpe:2.3:a:microsoft:office_compatibility_pack:2007:-:*:*:*:*:*:* cpe:2.3:a:microsoft:sharepoint_server:2007:*:*:*:*:*:x64:* cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:excel:2003:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:excel_viewer:2003:-:*:*:*:*:*:* cpe:2.3:a:microsoft:excel:2007:-:*:*:*:*:*:* cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:* cpe:2.3:a:microsoft:sharepoint_server:2007:sp1:*:*:*:*:x64:* cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:* |
CWE | CWE-190 | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/45581 - Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6102 - Third Party Advisory | |
References | (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 - Patch, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=122479227205998&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA08-288A.html - Third Party Advisory, US Government Resource | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2808 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id?1021044 - Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/45580 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/31706 - Patch, Third Party Advisory, VDB Entry |
Information
Published : 2008-10-15 00:12
Updated : 2024-02-04 17:33
NVD link : CVE-2008-4019
Mitre link : CVE-2008-4019
CVE.ORG link : CVE-2008-4019
JSON object : View
Products Affected
microsoft
- office_compatibility_pack
- office
- sharepoint_server
- open_xml_file_format_converter
- excel
- excel_viewer
CWE
CWE-190
Integer Overflow or Wraparound