Re: MS Excel Remote Code Execution POC Exploit

2006-06-26 Thread naveed
This is an exploit for the microsoft hlink.dll buffer overflow which is used while handling hyperlinks in microsoft office. The related MSRC blog entry is located here http://blogs.technet.com/msrc/archive/2006/06/20/437826.aspx On 6/23/06, Steven M. Christey <[EMAIL PROTECTED]> wrote: > * Ad

Re: Re: MS Excel Remote Code Execution POC Exploit

2006-06-24 Thread Juha-Matti Laurio
"Steven M. Christey" <[EMAIL PROTECTED]> wrote: > * Advisories: > * http://www.microsoft.com/technet/security/advisory/921365.mspx > * http://www.securityfocus.com/bid/18422/ There are at least three separate Excel issues that were published in the past week. These references suggest that it'

Re: MS Excel Remote Code Execution POC Exploit

2006-06-23 Thread Steven M. Christey
> * Advisories: > * http://www.microsoft.com/technet/security/advisory/921365.mspx > * http://www.securityfocus.com/bid/18422/ There are at least three separate Excel issues that were published in the past week. These references suggest that it's the "zero-day" exploit from last Friday (CVE-2006

Re: MS Excel Remote Code Execution POC Exploit

2006-06-22 Thread naveed
The excel sheet being generated in this poc may not be valid for excel verions other than excel 2000 , you need to do some modifications in order to generate a valid sheet for excel 2003, specifically take care of the size of url string that is placed after the first header and the actual buffer

RE: MS Excel Remote Code Execution POC Exploit

2006-06-22 Thread Jain, Siddhartha
Failed against: - Microsoft Excel 2003 (11.8012.6568) SP2 on Windows XP Pro SP2 * Excel complains that the excel sheet is corrupt * Excel tries to repair it but complains that its beyond replair * The first cell shows the word "LINK" without the hyperlink - Siddhartha -Original Message--