Description
Vulnerability in (1) Microsoft Excel 2002 and earlier and (2) Microsoft PowerPoint 2002 and earlier allows attackers to bypass macro restrictions and execute arbitrary commands by modifying the data stream in the document.
Products
- Microsoft Excel
- Microsoft Excel
- Microsoft Excel for Android
- Microsoft Excel x64 (64-bit) Editions
- Microsoft Excel 2.0
- Microsoft Excel 2000
- Microsoft Excel 2000 gold
- Microsoft Excel 2000 sp1
- Microsoft Excel 2000_sr1a
- Microsoft Excel 2000 SP2
- Microsoft Excel 2000 Service Pack 3
- Microsoft Excel 2000 SR1
- Microsoft Excel 2000 sr1a
- Microsoft Excel 2001
- Microsoft Excel 2002
- Microsoft Excel 2002 gold
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft Office Excel 2002 Service Pack 3
- Microsoft Excel 3.0
- Microsoft Excel 4.0
- Microsoft Excel 95
- Microsoft Excel 97
- Microsoft Excel 97 gold
- Microsoft Excel 97_sr1
- Microsoft Excel 97_sr2
- Microsoft Excel 97 SR1
- Microsoft Excel 97 SR2
- Microsoft PowerPoint
- Microsoft PowerPoint
- Microsoft Powerpoint for Android
- Microsoft PowerPoint 2000
- Microsoft PowerPoint 2000 Japanese
- Microsoft PowerPoint 2000 Korean
- Microsoft PowerPoint 2000 Chinese
- Microsoft PowerPoint 2000 sp2
- Microsoft PowerPoint 2000 sp3
- Microsoft PowerPoint 2000 sr1
- Microsoft PowerPoint 2001
- Microsoft PowerPoint 2001 for Mac OS
- Microsoft PowerPoint 2002
- Microsoft PowerPoint 2002 sp1
- Microsoft PowerPoint 2002 sp2
- Microsoft PowerPoint 2002 Service Pack 3
- Microsoft PowerPoint 95
- Microsoft PowerPoint 97
- Microsoft PowerPoint 97 any any ja
- Microsoft PowerPoint 97 any any ko
- Microsoft PowerPoint 97 any any zh
- Microsoft PowerPoint 98
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2001-0718, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2001-0718 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References