Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-3242 | First vendor Publication | 2010-10-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Ghost Record Type Parsing Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3242 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6902 | |||
Oval ID: | oval:org.mitre.oval:def:6902 | ||
Title: | Ghost Record Type Parsing Vulnerability | ||
Description: | Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Ghost Record Type Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3242 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Microsoft Excel 2002 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 2 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-13 | Name : Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211) File : nvt/secpod_ms10-080.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
68561 | Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution Microsoft Office Excel contains a flaw that may allow a context-dependent attacker to execute arbitrary commands or code. The issue is due to missing input validation in a conversion routine when parsing a certain record type and can be exploited to corrupt memory outside the bounds of an allocated heap buffer via an overly large range specified by two record fields in a crafted Excel document, which may allow the attacker to execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2016-07-26 | Microsoft Office Excel RealTimeData record exploit attempt RuleID : 39347 - Revision : 2 - Type : FILE-OFFICE |
2016-07-26 | Microsoft Office Excel RealTimeData record exploit attempt RuleID : 39346 - Revision : 2 - Type : FILE-OFFICE |
2016-07-08 | Microsoft Office Excel RealTimeData record exploit attempt RuleID : 39158 - Revision : 1 - Type : FILE-OFFICE |
2016-07-08 | Microsoft Office Excel RealTimeData record exploit attempt RuleID : 39157 - Revision : 3 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Excel CrErr record integer overflow attempt RuleID : 37246 - Revision : 1 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Excel PtgName invalid index exploit attempt RuleID : 31476 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Excel PtgName invalid index exploit attempt RuleID : 31475 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Excel PtgName invalid index exploit attempt RuleID : 31474 - Revision : 3 - Type : FILE-OFFICE |
2014-11-16 | Microsoft Office Excel PtgName invalid index exploit attempt RuleID : 31473 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel MergeCells record parsing code execution attempt RuleID : 21415 - Revision : 10 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel MergeCells record parsing code execution attempt RuleID : 21414 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel PtgExtraArray data parsing vulnerability exploit attempt RuleID : 19134 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel RealTimeData record exploit attempt RuleID : 18806 - Revision : 20 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel PtgName invalid index exploit attempt RuleID : 18538 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel PtgName invalid index exploit attempt RuleID : 17764 - Revision : 19 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel GhostRw record exploit attempt RuleID : 17763 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Excel corrupted TABLE record clean up exploit attempt RuleID : 17762 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel RealTimeData record exploit attempt RuleID : 17760 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel invalid SerAr object exploit attempt RuleID : 17759 - Revision : 19 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel PtgExtraArray data parsing vulnerability exploit attempt RuleID : 17758 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel CrErr record integer overflow attempt RuleID : 17757 - Revision : 16 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-20 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_oct2010.nasl - Type : ACT_GATHER_INFO |
2010-10-13 | Name : Arbitrary code can be executed on the remote host through Microsoft Office Ex... File : smb_nt_ms10-080.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:24 |
|
2024-11-28 12:22:48 |
|
2021-05-04 12:12:19 |
|
2021-04-22 01:13:04 |
|
2020-05-23 00:26:24 |
|
2018-10-13 00:22:59 |
|
2017-09-19 09:23:55 |
|
2016-04-26 20:03:58 |
|
2014-02-17 10:57:12 |
|
2014-01-19 21:27:07 |
|
2013-05-10 23:31:45 |
|