Microsoft "Office HTML" & "IE" Script Vulnerabilities
Privacy and Legal Notice
CIAC INFORMATION BULLETIN
K-061: Microsoft "Office HTML" & "IE" Script Vulnerabilities
July 21, 2000 14:00 GMT
PROBLEM: Security vulnerabilities ("Office HTML") have been found in
Office 2000 (Excel and PowerPoint) and in PowerPoint 97.
Internet Explorer also has a vulnerability ("IE") that can be
exploited using Access.
PLATFORM: Those running:
Microsoft Excel 2000
Microsoft PowerPoint 97 and 2000
Microsoft Internet Explorer 5.5, 5.01 SP1, 5.01, 4.01 SP2
DAMAGE: The first set of vulnerabilities allows malicious script code
on a web page to cause a remotely hosted file to be saved on a
visiting user's hard drive. The second vulnerability allows
malicious script code on a web page to execute a VBA macro code
in a remotely hosted file.
SOLUTION: Apply the patches given below to eliminate the first set of
vulnerabilities. A workaround for the second vulnerability is
also given below.
VULNERABILITY The risk is HIGH. The vulnerabilites and exploits have been
ASSESSMENT: discussed in public forums.
[ Start of Microsoft advisory for "The Office HTML Script" vulnerability ]
Microsoft Security Bulletin (MS00-049)
Patch Available for "The Office HTML Script" Vulnerability and a
Workaround for "The IE Script" Vulnerability
Originally Posted: July 13, 2000
Summary
Microsoft has released a patch that eliminates a security vulnerability in
Microsoft (r) Office 2000 (Excel and PowerPoint) and in PowerPoint 97.
Microsoft has also documented a workaround that prevents the use of
Microsoft Access to exploit a vulnerability in Internet Explorer. A patch
for the latter vulnerability will be available soon and we will have an
update to this bulletin.
Frequently asked questions regarding this vulnerability and the patch can
be found at
http://www.microsoft.com/technet/security/bulletin/fq00-049.asp
Issue
Two vulnerabilities have recently been discovered, one affecting Microsoft
Office 2000, and PowerPoint 97, and the other Internet Explorer 4.01 SP2
and higher. We will refer to these issues as the "Office script" and "IE
script" vulnerabilities. The names refer to the product where the
vulnerability is present, but not necessarily how the vulnerability is
exploited.
*) The Office HTML Script vulnerability, allows malicious script code on a
web page to reference an Excel 2000 or PowerPoint file in such a way as
to cause a remotely hosted file to be saved to a visiting user’s hard
drive.
This vulnerability can only be exploited by a reference to an Excel 2000
or PowerPoint file; it cannot be exploited using Excel 97, Microsoft
Word or a Microsoft Access file.
*) The IE Script vulnerability, can allow malicious script code on a web
page to reference a remotely hosted Microsoft Access file. The Microsoft
Access file can in turn causes a VBA macro code in the file to be
executed.
Affected Software Versions
Microsoft Excel 2000
Microsoft PowerPoint 97 and 2000
Microsoft Internet Explorer 5.5, 5.01 SP1, 5.01, 4.01 SP2
Patch Availability
Microsoft Excel 2000 and PowerPoint 2000:
http://officeupdate.microsoft.com/2000/downloaddetails/Addinsec.htm
Microsoft PowerPoint 97:
http://officeupdate.microsoft.com/downloaddetails/PPt97sec.htm
Note Additional security patches are available at the Microsoft Download
Center
More Information
Please see the following references for more information related to this
issue.
Frequently Asked Questions: Microsoft Security Bulletin MS00-049,
http://www.microsoft.com/technet/security/bulletin/fq00-049.asp
Microsoft Knowledge Base (KB) articles:
Q268365 (Excel 2000), Q268457 (PowerPoint 2000), Q268477 (PowerPoint 97)
discusses "The Office HTML Script" vulnerability.
The Microsoft Office Update Site, http://officeupdate.microsoft.com
Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp .
Revisions
July 13, 2000: Bulletin Created.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION
OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT,
INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
Last Updated July 18, 2000
(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.
[ End of Microsoft advisory for "The Office HTML Script" vulnerability ]
----------------------------------------------------------------
[ Start of Microsoft workaround for "The IE Script" vulnerability ]
(The following was extracted from "Microsoft Security Bulletin
(MS00-049): Frequently Asked Questions".)
What's the scope of the IE Script vulnerability?
The IE Script vulnerability allows any Microsoft Access database to
execute, if it is hosted on a web page that contains script code
referencing an Access .mdb file.
What causes the IE Script vulnerability?
Internet Explorer allows the execution of a remotely or locally hosted
Microsoft Access database that is referenced from a web page containing
script code. By default Microsoft Access files are treated as unsafe for
scripting; however, a certain script tag can be used to reference an
Access (.mdb) file and execute VBA macro code even if scripting has been
disabled in Internet Explorer.
What is the workaround for the IE Script vulnerability?
The workaround for this vulnerability is to set an Administrator password
for Microsoft Access. This will cause Microsoft Access to prompt the user
for the Administrator password before VBA code within an Access database
can be executed.
[ End of Microsoft workaround for "The IE Script" vulnerability ]
CIAC wishes to acknowledge the contributions of Microsoft for the
information contained in this bulletin.
CIAC services are available to DOE, DOE Contractors, and the NIH. CIAC
can be contacted at:
Voice: +1 925-422-8193 (7 x 24)
FAX: +1 925-423-8002
STU-III: +1 925-423-2604
E-mail: ciac@llnl.gov
World Wide Web: http://www.ciac.org/
http://ciac.llnl.gov
(same machine -- either one will work)
Anonymous FTP: ftp.ciac.org
ciac.llnl.gov
(same machine -- either one will work)
This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.
UCRL-MI-119788
[Privacy and Legal Notice]
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH