ZDI released information about unpatched critical vulnerability in Microsoft Excel 2007/2010/2013

ZDI released information about unpatched critical vulnerability in Microsoft Excel 2007/2010/2013

Use-after-free error was disclosed in Microsoft Office Excel 2007, 2010 and 2013. The vulnerability allows remote code execution when the victim opens a malicious .xlsb file. This file can be delivered via email or during internet surfing.

The vulnerability was disclosed by Zero Day Initiative, a security company recently acquired by HP. ZDI-15-639 contains brief description of this vulnerability.

PoC code is available on GitHub. Detailed explanation of this vulnerability can be found here.

We have tested the provided PoC codes against Microsoft Excel 2013 and confirm successful crash of Microsoft Excel. Further investigation may show if the vulnerability could be used to execute arbitrary code in the latest version of Microsoft Office.

Our analysis shows that, combined with recent generic ASLR bypass in Microsoft Office and publicly disclosed PoC codes, public exploitation of this vulnerability is highly possible in the nearest future.

Back to the list

Latest Posts

Cyber Security Week in Review: March 28, 2025

Cyber Security Week in Review: March 28, 2025

In brief: Google patches a Chrome zero-day bug, MMC zero-day bug linked to EncryptHub attacks, and more.
28 March 2025
New credential stuffing service Atlantis AIO targets over 140 online platforms

New credential stuffing service Atlantis AIO targets over 140 online platforms

The service offers pre-configured modules that specifically target major online platforms.
27 March 2025
FamousSparrow updates its attack arsenal with two new versions of SparrowDoor backdoor

FamousSparrow updates its attack arsenal with two new versions of SparrowDoor backdoor

The two versions come with upgrades in both architecture and functionality.
26 March 2025