CVE-2012-1887
Description
Use-after-free vulnerability in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1, and Office 2008 and 2011 for Mac, allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel SST Invalid Length Use After Free Vulnerability."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in Microsoft Excel via a crafted spreadsheet with an invalid SST length allows remote code execution when opened by a user.
Vulnerability
A use-after-free vulnerability exists in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1, as well as Office 2008 and 2011 for Mac [1][2]. The bug occurs when parsing a specially crafted spreadsheet with an invalid Shared String Table (SST) length field, causing improper memory handling. An attacker can trigger the use-after-free condition by enticing a user to open a malicious .xls file. The vulnerability is formally known as "Excel SST Invalid Length Use After Free Vulnerability" [1].
Exploitation
Exploitation requires no authentication beyond the user's normal privileges. An attacker first crafts a malicious Excel file with a malformed SST record. The attacker then convinces the target to open the file, typically via email attachment or a link on a compromised website [1]. No special network position is required, and no additional user interaction beyond opening the file is needed. The parsing routine incorrectly frees memory and then references it, allowing control of execution flow [1].
Impact
Successful exploitation gives the attacker arbitrary code execution in the context of the current user. If the user has administrative privileges, the attacker can gain full system control, install programs, view/change/delete data, or create new accounts [1]. Users with fewer rights are less impacted, but code execution at the user's privilege level is still achieved.
Mitigation
Microsoft released security update MS12-076 on November 13, 2012, which corrects the way Excel validates SST record data [1]. Users should apply the update via Windows Update or manual download for affected versions: Excel 2003, 2007, 2010, Office 2008 for Mac, and Office for Mac 2011. No workarounds other than the patch are documented. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the last update.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:excel:2010:sp1:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:excel:2010:sp1:x86:*:*:*:*:*
- Range: = SP2, SP3
- Range: = SP1
- Range: = SP3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.us-cert.gov/cas/techalerts/TA12-318A.htmlnvdUS Government Resource
- www.securityfocus.com/bid/56430nvd
- www.securitytracker.com/idnvd
- docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-076nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/78074nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15717nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15970nvd
News mentions
0No linked articles in our index yet.