|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Excel: two vulnerabilities
Synthesis of the vulnerability
An attacker can invite the victim to open a malicious file with Excel, in order to execute code on his computer.
Impacted software: Office, Excel.
Severity of this computer vulnerability: 3/4.
Consequences of an attack: user access/rights.
Attacker's origin: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/10/2013.
Références of this announce: 2885080, BID-62824, BID-62829, CERTA-2013-AVI-564, CVE-2013-3889, CVE-2013-3890, MS13-085, VIGILANCE-VUL-13564.
Description of the vulnerability
Several vulnerabilities were announced in Excel.
An attacker can generate a memory corruption via an Excel document, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; BID-62829, CVE-2013-3889]
An attacker can generate a memory corruption via an Excel document, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; BID-62824, CVE-2013-3890]
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a networks vulnerabilities management. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.