MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2720184) (Mac OS X)

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

It is possible to execute arbitrary code on the remote host through
Microsoft Excel.

Description :

The remote Mac OS X host is running a version of Microsoft Excel that
is affected by the following vulnerabilities :

- A heap-based buffer overflow vulnerability exists due to
the way the application handles memory when opening
Excel files. (CVE-2012-1885)

- A memory corruption vulnerability exists due to the way
the application handles memory when opening Excel
files. (CVE-2012-1886)

- A use-after-free vulnerability exists due to the way
the application handles memory when opening Excel
files. (CVE-2012-1887)

- A stack-based buffer overflow vulnerability exists due
to the way the application handles data structures while
parsing Excel files. (CVE-2012-2543)

If an attacker can trick a user on the affected host into opening a
specially crafted Excel file, it may be possible to leverage these
issues to execute arbitrary code subject to the user's privileges.

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms12-076

Solution :

Microsoft has released a set of patches for Office for Mac 2011 and
Office 2008 for Mac.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 62909 ()

Bugtraq ID: 56425
56426
56430
56431

CVE ID: CVE-2012-1885
CVE-2012-1886
CVE-2012-1887
CVE-2012-2543