TUCoPS :: Windows Apps :: ciacm004.txt

CIAC M-004 Excel and PowerPoint Macro Vulnerability txt.011015130546

 Department of Energy
                     Computer Incident Advisory Center
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
             __________________________________________________________

                             INFORMATION BULLETIN

                    Excel and PowerPoint Macro Vulnerability

October 8, 2001 20:00 GMT                                         Number M-004
______________________________________________________________________________
PROBLEM:       Excel and PowerPoint macros can be written to avoid detection 
               by the macro security process. This vulnerability is the same as
               one that Microsoft published earlier for Word.
PLATFORM:      Microsoft Excel 98 for Macintosh
               Microsoft Excel 2000 for Windows 
               Microsoft Excel 2001 for Macintosh
               Microsoft Excel 2002 for Windows 
               Microsoft PowerPoint 98 for Macintosh 
               Microsoft PowerPoint 2000 for Windows
               Microsoft PowerPoint 2001 for Macintosh 
               Microsoft PowerPoint 2002 for Windows 
DAMAGE:        Excel and PowerPoint may allow a specially formed document with 
               macro code to run arbitrary malicious code without prior 
               warning to the user. 
SOLUTION:      Patch or upgrade as directed in the bulletin. 
______________________________________________________________________________
VULNERABILITY  The risk is MEDIUM. Circumvented macro security processes may 
ASSESSMENT:    allow malicious macro code to run without prior warning. 
______________________________________________________________________________
LINKS: 
CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/m-004.shtml 
ORIGINAL BULLETINS:                                                           
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/
                     security/bulletin/MS01-050.asp (Excel and PowerPoint)
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/
                     security/bulletin/MS01-034.asp (Word)
PATCHES:            Microsoft Excel 2000 for Windows: 
                     http://download.microsoft.com/download/excel2000/e2kmac/1/w98nt42kme/en- 
                     us/e2kmac.exe
                     Microsoft Excel 2002 for Windows: 
                     http://download.microsoft.com/download/excel2002/exc1001/1/w98nt42kme/en- 
                     us/exc1001.exe Microsoft Excel 98 for Macintosh: 
                     http://www.microsoft.com/mac/download/office98/pptxlmacro.asp 
                     Microsoft Excel 2001 for Macintosh: 
                     http://www.microsoft.com/mac/download/office2001/pptxlmacro.asp 
                     Microsoft PowerPoint 2000 for Windows: 
                     http://download.microsoft.com/download/powerpoint2000/p2kmac/1/w98nt42kme/en- 
                     us/p2kmac.exe Microsoft PowerPoint 2002 for Windows: 
                     http://download.microsoft.com/download/powerpoint2002/ppt1001/1/w98nt42kme/en- 
                     us/ppt1001.exe Microsoft PowerPoint 98 for Macintosh: 
                     http://www.microsoft.com/mac/download/office98/pptxlmacro.asp 
______________________________________________________________________________

[******  Start Advisory ******]
Microsoft Security Bulletin MS01-050  


Malformed Excel or PowerPoint Document Can Bypass Macro Security
Originally posted: October 04, 2001

Summary
Who should read this bulletin: Customers using Microsoft(r) Excel or PowerPoint 
for Windows(r) or Macintosh(r) 

Impact of vulnerability: Run code of attacker's choice. 

Recommendation: Customers using affected versions of Excel and/or PowerPoint 
should apply the patch immediately. 

Affected Software: 

Microsoft Excel 2000 for Windows 
Microsoft Excel 2002 for Windows 
Microsoft Excel 98 for Macintosh 
Microsoft Excel 2001 for Macintosh 
Microsoft PowerPoint 2000 for Windows 
Microsoft PowerPoint 2002 for Windows 
Microsoft PowerPoint 98 for Macintosh 
Microsoft PowerPoint 2001 for Macintosh 

Technical details
Technical description: 


Excel and PowerPoint have a macro security framework that controls the execution 
of macros and prevents macros from running automatically. Under this framework, 
any time a user opens a document the document is scanned for the presence of 
macros. If a document contains macros, the user is notified and asked if he 
wants to run the macros or the macros are disabled entirely, depending on the 
security setting. A flaw exists in the way macros are detected that can allow a 
malicious user to bypass macro checking. 

A malicious attacker could attempt to exploit this vulnerability by crafting a 
specially formed Excel or PowerPoint document with macro code that would run 
automatically when the user opened it. The attacker could carry out this attack 
by hosting the malicious file on a web site, a file share, or by sending it 
through email. 

Mitigating factors: 

The macro code could not execute without the user's first opening the document. 
Vulnerability identifier: CAN-2001-0718 

Tested Versions:
Microsoft tested the following products to assess whether they are affected by 
these vulnerabilities. Previous versions are no longer supported, and may or may 
not be affected by these vulnerabilities. 

Office 98 for Macintosh 
Office 2001 for Macintosh 
Office 2000 for Windows 
Office 2002 for Windows 

 Frequently asked questions 
What's the scope of the vulnerability?

This vulnerability could enable a malicious user to create specially formed 
Excel or PowerPoint files that would bypass macro security and execute 
automatically when the document is opened. Because macros by design can take any 
action that the user is able to take, this vulnerability could allow an attacker 
to take actions such as changing or deleting data, communicating with web sites, 
or changing the macro security settings. 
This would not be able to take any actions that the user is not normally capable 
of. As such, access controls that limit the user's abilities would also limit 
the ability of the malicious documents. Further, a successful attack would 
require that the user open the malicious document. Best practices recommend that 
users not open documents from unknown or untrusted sources.

What causes the vulnerability?

The vulnerability results because the macro detecting framework can fail to 
detect all instances in which the macro processor can execute macro commands. 
When a valid document is intentionally designed to obfuscate the presence of 
macros, it is still possible for those marcos to execute.
What are macros?

Macros are small programs within applications such as Excel and PowerPoint. When 
macros run, they can take actions within the application or the operating system 
as if they were the user. An example of a simple action a macro might take in an 
application would be to find and replace text within a document. A more 
sophisticated macro might include features that perform automatic formatting on 
a document, copy files from the local system to the network, and send review 
copies by email. 
Because macros are really small programs, it is possible for attackers to create 
malicious macros that take undesirable actions, such as deleting files, sending 
unwanted messages by email, or changing the data in documents. To help protect 
against malicious macros, Excel and PowerPoint have a security model that 
prevent macros from executing without warning. 

What's wrong with the macro protection in Excel and PowerPoint?

It is possible for a malicious user to create a specially malformed Excel or 
PowerPoint document that would bypass the macro protections and allow macros to 
execute automatically.
Is it possible to create a document like this by accident?

No. It is not possible to create a document that bypasses macro protection by 
accident. It would require very specific, detailed knowledge and such a document 
would have to be specifically constructed with malicious intent.
What could an attacker use this vulnerability to do?

This could allow an attacker to craft a malicious document with macro code that 
would run automatically when the user opened the document.
What actions could the malicious document take?

Because macros take action on behalf of the user, a macro virus that ran would 
be able to take actions that the user himself is able to take, including 
changing or deleting files, sending data to external web sites, or reformatting 
the hard drive. 
It's important to highlight that this means that it is possible for a macro 
virus to reset the user's security settings. A successful macro virus attack 
could leave a system vulnerable to future attack by disabling the security 
settings. 

How would an attacker carry out an attack against this vulnerability?

An attacker could carry out an attack by several different routes. She could 
host a malicious document on a web site internally or on the Internet. She could 
place a malicious document on any file server to which she had appropriate 
permissions. Additionally, she could target specific individuals by sending a 
copy through email. 
It's important to note that all attempts to carry out an attack require the 
potential victim to open the document. It is not possible to exploit this 
vulnerability without the user's action. Opening documents only from known, 
trusted sources will help to protect against an attempt to maliciously exploit 
this vulnerability. 

What does the patch do?

The patch eliminates the vulnerability by improving the code which detects the 
presence of macros in these document types.
Who should apply the patch?

Anyone using or administering systems running the affected software versions 
should apply the patch
I'm running Excel 97 and/or PowerPoint 97, does this issue affect me?

First, it's important to understand that Excel and PowerPoint 97 do not have the 
same macro security framework as Excel and PowerPoint 2000 and 2002. The Excel 
and PowerPoint 97 macro security framework lacks many key features that the 2000 
and 2002 macro security framework has, including a digital signature trust model 
that allows trusted, signed macros to be differentiated from untrusted, unsigned 
macros. Under this older framework, it is difficult for a user to make an 
informed decision regarding the trustworthiness of macros. 
In addition, as noted under "Tested Versions", Excel and PowerPoint 97 are no 
longer supported products. 

Because of these two issues, customers who are concerned about macro security 
are urged to upgrade to a support version with a more robust macro security 
model. 

Are other members of the Office Suite vulnerable?

No. All members of the Office Suites for Windows and Macintosh were tested. No 
other products in the Office Suite were found to be vulnerable.

Patch availability
Download locations for this patch 
Microsoft Excel 2000 for Windows:
http://download.microsoft.com/download/excel2000/e2kmac/1/w98nt42kme/en-
us/e2kmac.exe 
Microsoft Excel 2002 for Windows:
http://download.microsoft.com/download/excel2002/exc1001/1/w98nt42kme/en-
us/exc1001.exe 
Microsoft Excel 98 for Macintosh:
http://www.microsoft.com/mac/download/office98/pptxlmacro.asp 
Microsoft Excel 2001 for Macintosh:
http://www.microsoft.com/mac/download/office2001/pptxlmacro.asp 
Microsoft PowerPoint 2000 for Windows:
http://download.microsoft.com/download/powerpoint2000/p2kmac/1/w98nt42kme/en-
us/p2kmac.exe 
Microsoft PowerPoint 2002 for Windows:
http://download.microsoft.com/download/powerpoint2002/ppt1001/1/w98nt42kme/en-
us/ppt1001.exe 
Microsoft PowerPoint 98 for Macintosh:
http://www.microsoft.com/mac/download/office98/pptxlmacro.asp 
Microsoft PowerPoint 2001 for Macintosh:
http://www.microsoft.com/mac/download/office2001/pptxlmacro.asp 

 Additional information about this patch
Installation platforms: 
These patches can be installed on systems running Excel or PowerPoint 2000 SR-1 
or SP2 for Windows and systems running Excel or PowerPoint 98 or 2001 for 
Macintosh. 
Inclusion in future service packs:
The fix for this issue will be included in Office XP Service Pack 1. 

Reboot needed:No 

Superseded patches: None. 

Verifying patch installation: 

Microsoft Excel 2000 for Windows:
Select the Help menu, and choose "About", and verify that the version shown in 
the dialogue is 9.0.5519. 
Microsoft Excel 2002 for Windows:
Select the Help menu, and choose "About", and verify that the version shown in 
the dialogue is 10.3207.2625. 
Microsoft PowerPoint 2000 for Windows:
Select the Help menu, and choose "About", and verify that the version shown in 
the dialogue is 9.0.5519. 
Microsoft PowerPoint 2002 for Windows:
Select the Help menu, and choose "About", and verify that the version shown in 
the dialogue is 10.3207.2625. 
Microsoft Excel and PowerPoint 98 for Macintosh:
Select the file in the Finder, From the File menu, choose "Get Info", and verify 
that the version shown is 9.0.1 (3618). 
Microsoft Excel and PowerPoint 2001 for Macintosh:
Select the file in the Finder, From the File menu, choose "Get Info", and verify 
that the description shown is "2001 Security Update". 
Caveats:
None 

Localization:
Localized versions of this patch are available at the locations discussed in 
"Obtaining other security patches". 

Obtaining other security patches: 
Patches for other security issues are available from the following locations: 

Security patches are available from the Microsoft Download Center, and can be 
most easily found by doing a keyword search for "security_patch". 
Patches for consumer platforms are available from the WindowsUpdate web site 
All patches available via WindowsUpdate also are available in a redistributable 
form from the WindowsUpdate Corporate site. 
Other information: 
Acknowledgments
Microsoft thanks  Peter Ferrie of Symantec Security Response 
(http://securityresponse.symantec.com) for reporting this issue to us and 
working with us to protect customers. 

Support: 

Microsoft Knowledge Base articles Q306603, Q306604, Q306605, Q306606 discuss 
these issues and will be available approximately 24 hours after the release of 
this bulletin. Knowledge Base articles can be found on the Microsoft Online 
Support web site. 
Technical support is available from Microsoft Product Support Services. There is 
no charge for support calls associated with security patches. 
Security Resources: The Microsoft TechNet Security Web Site provides additional 
information about security in Microsoft products. 

Disclaimer: 
The information provided in the Microsoft Knowledge Base is provided "as is" 
without warranty of any kind. Microsoft disclaims all warranties, either express 
or implied, including the warranties of merchantability and fitness for a 
particular purpose. In no event shall Microsoft Corporation or its suppliers be 
liable for any damages whatsoever including direct, indirect, incidental, 
consequential, loss of business profits or special damages, even if Microsoft 
Corporation or its suppliers have been advised of the possibility of such 
damages. Some states do not allow the exclusion or limitation of liability for 
consequential or incidental damages so the foregoing limitation may not apply. 

Revisions: 


V1.0 (October 04, 2001): Bulletin Created. 

[******  End Advisory ******]
_______________________________________________________________________________

CIAC wishes to acknowledge the contributions of Microsoft for the 
information contained in this bulletin.
_______________________________________________________________________________


CIAC, the Computer Incident Advisory Center, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.

CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
    Voice:    +1 925-422-8193 (7x24)
    FAX:      +1 925-423-8002
    STU-III:  +1 925-423-2604
    E-mail:   ciac@ciac.org

Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.

   World Wide Web:      http://www.ciac.org/
   Anonymous FTP:       ftp.ciac.org

PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins.  If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)

L-138: Gauntlet Firewall CSMAP and smap/smapd Buffer Overflow Vulnerability
L-139: Microsoft IIS "%u encoding IDS bypass vulnerability" 
L-140: Gauntlet Firewall CSMAP and smap/smapd Buffer Overflow Vulnerability 
L-141: RSA BSAFE SSL-J 3.x Vulnerability
L-142: RPC Endpoint Mapper Vulnerability 
L-143: HP libsecurity Vulnerability
L-144: The W32.nimda Worm
M-001: Cisco Secure IDS Signature Obfuscation Vulnerability
M-002: Multi-Vendor format String Vulnerability in ToolTalk Service
M-003: Hewlett-Packard rpcbind Security Vulnerability






TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH