Patch Available for Excel 97 Virus Warning Vulnerabilities
Published: May 07, 1999
Version: 1.0
Originally Posted: May 7, 1999
Summary
Microsoft has released a patch that eliminates vulnerabilities in the Microsoft® Excel 97 virus warning mechanism. The patch is fully supported, and Microsoft recommends that affected customers download and install it, if appropriate.
Issue
Microsoft Excel 97 provides a feature that warns the user before launching an external file that could potentially contain a virus or other malicious software. This feature allows the user to weigh the risk of opening the file, based on its origin, the network it is located on and the security practices in operation there, the sensitivity of the data on the user's computer, and other factors.
However, certain scenarios have been identified that could be misused to bypass the warning mechanism. In general, they require the use of infrequently-combined features and commands, and are unlikely to be encountered in normal use. This patch addresses these issues so that they cannot be taken advantage of by a malicious user.
While there are no reports of customers being adversely affected by any of the vulnerabilities eliminated by the patch, Microsoft is proactively releasing the patch to allow customers to take appropriate action to protect themselves against it. These fixes are already built into Excel 2000 and users of that product will not need to download this patch.
Microsoft has released patches that fix the problem identified. The patches are available for download from the sites listed below in What Customers Should Do.
Microsoft also has sent this security bulletin to customers subscribing to the Microsoft Product Security Notification Service. See The Microsoft Product Security Notification Service for more information about this free customer service.
Microsoft has published the following Knowledge Base (KB) article on this issue:
Microsoft Knowledge Base (KB) article 231304, Patch Available for Excel 97 Virus Warning Vulnerabilities, https:.
(Note: It might take 24 hours from the original posting of this bulletin for the KB article to be visible in the Web-based Knowledge Base.)
What Customers Should Do
Microsoft highly recommends that customers evaluate the degree of risk that this vulnerability poses to their systems and determine whether to download and install the patch. The patch can be found at: https://office.microsoft.com/downloads/9798/Xl8p9pkg.aspx
More Information
Please see the following references for more information related to this issue.
Microsoft Knowledge Base (KB) article 231304, Patch Available for Excel 97 Virus Warning Vulnerabilities, </https:>https:.
Obtaining Support on this Issue
If you require technical assistance with this issue, please contact Microsoft Technical Support. For information on contacting Microsoft Technical Support, please see </https:>https:.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Ransomware and extortion-based attacks are a high-reward, low-cost business that has escalated from extorting money from individuals to targeting businesses and organizations. The modules in this learning path will provide you with insights and information to help you better understand this threat, including a broad look at ransomware and extortion-based threats, how cybercriminals exploit security weaknesses to gain access to your computers and devices, some of the steps you can take prevent ransomware thr