VYPR
Unrated severityNVD Advisory· Published Nov 14, 2012· Updated Apr 29, 2026

CVE-2012-1887

CVE-2012-1887

Description

Use-after-free vulnerability in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1, and Office 2008 and 2011 for Mac, allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel SST Invalid Length Use After Free Vulnerability."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Microsoft Excel via a crafted spreadsheet with an invalid SST length allows remote code execution when opened by a user.

Vulnerability

A use-after-free vulnerability exists in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1, as well as Office 2008 and 2011 for Mac [1][2]. The bug occurs when parsing a specially crafted spreadsheet with an invalid Shared String Table (SST) length field, causing improper memory handling. An attacker can trigger the use-after-free condition by enticing a user to open a malicious .xls file. The vulnerability is formally known as "Excel SST Invalid Length Use After Free Vulnerability" [1].

Exploitation

Exploitation requires no authentication beyond the user's normal privileges. An attacker first crafts a malicious Excel file with a malformed SST record. The attacker then convinces the target to open the file, typically via email attachment or a link on a compromised website [1]. No special network position is required, and no additional user interaction beyond opening the file is needed. The parsing routine incorrectly frees memory and then references it, allowing control of execution flow [1].

Impact

Successful exploitation gives the attacker arbitrary code execution in the context of the current user. If the user has administrative privileges, the attacker can gain full system control, install programs, view/change/delete data, or create new accounts [1]. Users with fewer rights are less impacted, but code execution at the user's privilege level is still achieved.

Mitigation

Microsoft released security update MS12-076 on November 13, 2012, which corrects the way Excel validates SST record data [1]. Users should apply the update via Windows Update or manual download for affected versions: Excel 2003, 2007, 2010, Office 2008 for Mac, and Office for Mac 2011. No workarounds other than the patch are documented. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the last update.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Microsoft/Excel5 versions
    cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*
    • cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*
    • cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*
    • cpe:2.3:a:microsoft:excel:2010:sp1:x64:*:*:*:*:*
    • cpe:2.3:a:microsoft:excel:2010:sp1:x86:*:*:*:*:*
  • Microsoft/Office2 versions
    cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*+ 1 more
    • cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*
    • cpe:2.3:a:microsoft:office:2011:*:mac:*:*:*:*:*
  • Range: = SP2, SP3
  • Range: = SP1
  • Range: = SP3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.