CVE-2008-3006
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
12/08/2008
Last modified:
09/04/2025
Description
Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 Gold and SP3; Office Excel Viewer; Office Compatibility Pack 2007 Gold and SP1; Office SharePoint Server 2007 Gold and SP1; and Office 2004 and 2008 for Mac do not properly parse Country record values when loading Excel files, which allows remote attackers to execute arbitrary code via a crafted Excel file, aka the "Excel Record Parsing Vulnerability."
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_compatibility_pack:2007:*:gold:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_excel_viewer:2003:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_excel_viewer:2003:*:gold:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office_excel_viewer:2003:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:sharepoint_server:2007:*:gold:*:*:*:*:* | ||
cpe:2.3:a:microsoft:sharepoint_server:2007:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=121915960406986&w=2
- http://marc.info/?l=bugtraq&m=121915960406986&w=2
- http://secunia.com/advisories/31454
- http://secunia.com/advisories/31455
- http://www.securityfocus.com/archive/1/495428/100/0/threaded
- http://www.securityfocus.com/bid/30640
- http://www.securitytracker.com/id?1020672=
- http://www.us-cert.gov/cas/techalerts/TA08-225A.html
- http://www.vupen.com/english/advisories/2008/2347
- http://www.zerodayinitiative.com/advisories/ZDI-08-048/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5561
- http://marc.info/?l=bugtraq&m=121915960406986&w=2
- http://marc.info/?l=bugtraq&m=121915960406986&w=2
- http://secunia.com/advisories/31454
- http://secunia.com/advisories/31455
- http://www.securityfocus.com/archive/1/495428/100/0/threaded
- http://www.securityfocus.com/bid/30640
- http://www.securitytracker.com/id?1020672=
- http://www.us-cert.gov/cas/techalerts/TA08-225A.html
- http://www.vupen.com/english/advisories/2008/2347
- http://www.zerodayinitiative.com/advisories/ZDI-08-048/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5561