Debian Security Advisory

DLA-1098-1 freexl -- LTS security update

Date Reported:
17 Sep 2017
Affected Packages:
freexl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-2923, CVE-2017-2924.
More information:

The Cisco Talos team reported two sensitive security issues affecting FreeXL-1.0.3 and any previous version.

  • CVE-2017-2923

    An exploitable heap based buffer overflow vulnerability exists in the read_biff_next_record function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.

  • CVE-2017-2924

    An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.

For Debian 7 Wheezy, these problems have been fixed in version 1.0.0b-1+deb7u4.

We recommend that you upgrade your freexl packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS