XL97: Patch Available for Excel CALL VulnerabilityID: Q196791
|
Microsoft has released a patch for Microsoft Excel 97 that fixes a
vulnerability that could allow certain types of executables to be run
without a warning to the user.
This patch includes all of the updates that were released since the last
service release of Office, and the files included in this fix may be
included in later service releases or patches. For information about the
history of Excel 97 patches and releases and what they include, please see
the following article in the Microsoft Knowledge Base:
Q232652 XL97: Overview and History of Excel PatchesA legitimate Excel function, CALL, allows executables to be run from a worksheet and could be used to run executables of a malicious nature. A fully supported patch that disables this functionality is available. The patch works by disabling the CALL function on a worksheet, but does not disable the CALL function from within macros. Microsoft recommends that customers who need the CALL worksheet function evaluate the degree of risk that it poses to their systems and determine whether the best course of action is to apply the patch.
http://officeupdate.microsoft.com/downloadDetails/xl97cfp.htmThe "Excel 97 SR-2 CALL Function Patch" is designed to update Microsoft Excel 97 Service Release 2 (SR-2). Microsoft does not currently have plans to provide a solution for the CALL vulnerability issue for earlier versions of Microsoft Excel. Because earlier versions of Excel do not provide full macro virus protection, disabling only the CALL worksheet function would not provide a significant level of safety as the CALL function can also be used in a macro.
CALL is a legitimate, advanced function that calls an outside procedure in
a dynamic-link library (DLL) or code resource. The DLL or code resource
called could contain code to perform potentially damaging or malicious
behavior.
For example, using the CALL function in a workbook with the following syntax calls a DLL named Custom.dll containing a procedure named Test with a data type of Signed 4-byte integer:
=CALL("Custom", "Test", "J!")
Sub Main()
Call PrintToDebugWindow("Hello World")
' The above statement causes control to be passed to the
' Sub procedure below.
End Sub
Sub PrintToDebugWindow(AnyString)
Debug.Print AnyString ' Print to Debug window.
End Sub
Microsoft Excel 97 SR-2 CALL Function Patch - Patch RUP 12040001
Microsoft Excel has been patched successfully.
C:\Program Files\Microsoft Office\OfficeNOTE: If you are running Microsoft Excel 97 from a network server, Excel.exe is located on the network server.
Excel Help File Application.Build/ Patches/SRs
version menu (About) version Application.Version Included
----------------------------------------------------------------------------
Excel 97 SR-2 Excel 97 SR-2 8.0e 5618 / 8.0e SR-1,
Xl8p1.exe,
Xl8p2.exe,
Xl8p3.exe
Excel 97 SR-2 Excel 97 SR-2(f) 8.0f 5619 / 8.0f All fixes
and Xl8p4.exe in SR-2
NOTE: Any build/version number for Excel 97 greater than 5619/8.0f also includes this fix.
c:\windows\desktop\xl8p4pkg.exe /t:c:\windows\desktop /cand click OK. Then, click Yes.
c:\windows\desktop\xl8p4.exe /p "path to Excel.exe"where path to Excel.exe is the complete path to Excel.exe. You must type the path to Excel.exe in quotation marks; for example, type the following:
"D:\Office\Excel.exe"Then, click OK.
path\xl8p4kg.exe /q /c:"xl8p4.exe /s"where path is the location of xl8p4.exe.
For more information about the CALL function, click Contents And Index on the Help menu,
click the Index tab in Excel 97 Help, type the following text
Calland then double-click the selected text to go to the "Call" topic. If you are unable to find the information you need, ask the Office Assistant.
Additional query words: XL97
Keywords : kbpatch kbdta
Version : WINDOWS:97
Platform : WINDOWS
Issue type : kbhowto
Last Reviewed: June 16, 1999