CVE-2009-0088
https://notcve.org/view.php?id=CVE-2009-0088
The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability." El conversor WordPerfect 6.x en Microsoft Office Word 2000 SP3 y Microsoft Office Converter Pack no valida adecuadamente la longitud de una cadena no especificada, lo cual permite a atacantes remotos ejecutar código de su elección a través de un fichero WordPerfect 6.x manipulado, también conocido como "Vulnerabilidad de corrupción de pila en el conversor Word 2000 WordPerfect 6.x". • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=782 http://osvdb.org/53663 http://www.securitytracker.com/id?1022043 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1024 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5736 • CWE-20: Improper Input Validation •
CVE-2009-0556 – Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2009-0556
Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability." Vulnerabilidad inespecífica en Microsoft Office PowerPoint 2000 SP3, 2002 SP3, y 2003 SP3, y PowerPoint en Microsoft Office 2004 para Mac, permite a atacantes remotos ejecutar código arbitrario a través de un fichero PowerPoint que inicia un acceso a un "objeto no valido en memoria", Esta siendo explotado desde Abril 2009 mediante un exploit; Win32/Apptom.gen This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. Exploitation requires that the attacker coerce the target into opening a malicious .PPT file. The specific flaw exists in the parsing of the OutlineTextRefAtom (3998). By specifying an invalid "index" value during parsing memory corruption occurs. Proper exploitation can lead to remote code execution under the credentials of the currently logged in user. • http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx http://osvdb.org/53182 http://secunia.com/advisories/34572 http://www.kb.cert.org/vuls/id/627331 http://www.microsoft.com/technet/security/advisory/969136.mspx http://www.securityfocus.com/archive/1/5 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2009-0238
https://notcve.org/view.php?id=CVE-2009-0238
Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microsoft Office 2004 and 2008 for Mac allow remote attackers to execute arbitrary code via a crafted Excel document that triggers an access attempt on an invalid object, as exploited in the wild in February 2009 by Trojan.Mdropper.AC. Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3 y 2007 SP1; Excel Viewer 2003 Gold y SP3; Excel Viewer; Compatibility Pack para Word, Excel y PowerPoint 2007 File Formats SP1; y Excel de Microsoft Office 2004 y 2008 para Mac; permiten a atacantes remotos ejecutar código de su elección a través de un documento Excel manipulado que provoca un intento de acceso a un objeto no válido, tal y como se ha explotado libremente en Febrero 2009 por MDropper.XR. • http://blogs.zdnet.com/security/?p=2658 http://isc.sans.org/diary.html?storyid=5923 http://securitytracker.com/id?1021744 http://www.microsoft.com/technet/security/advisory/968272.mspx http://www.securityfocus.com/bid/33870 http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1023 https://docs.microsoft.com/en-us/security-updates/securitybulletins • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2008-4252
https://notcve.org/view.php?id=CVE-2008-4252
The DataGrid ActiveX control in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "DataGrid Control Memory Corruption Vulnerability." El control ActiveX DataGrid de Microsoft Visual Basic 6.0 y Visual FoxPro 8.0 SP1, y 9.0 SP1 y SP2, no maneja adecuadamente los errores en el acceso a objetos no iniciados correctamente, esto permite a atacantes remotos ejecutar código de su elección a través de un documento HTML manipulado; está relacionado con la corrupción del "estado del sistema". También se como "Vulnerabilidad de Corrupción en el Control de Memoria DataGrid". • http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm http://www.securityfocus.com/bid/32591 http://www.securitytracker.com/id?1021369 http://www.us-cert.gov/cas/techalerts/TA08-344A.html http://www.vupen.com/english/advisories/2008/3382 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5894 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-4265
https://notcve.org/view.php?id=CVE-2008-4265
Microsoft Office Excel 2000 SP3 allows remote attackers to execute arbitrary code via a crafted Excel spreadsheet that contains a malformed object, which triggers memory corruption during the loading of records from this spreadsheet, aka "File Format Parsing Vulnerability." Microsoft Office Excel 2000 SP3 permite a atacantes remotos ejecutar código de su elección mediante una hoja de cálculo manipulada que contiene un objeto malformado, lo que dispara una corrupción de memoria durante la carga de registros desde esta hoja de cálculo, alias "Vulnerabilidad de Análisis de Formato de Fichero". • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=763 http://www.securitytracker.com/id?1021368 http://www.us-cert.gov/cas/techalerts/TA08-344A.html http://www.vupen.com/english/advisories/2008/3386 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5614 • CWE-399: Resource Management Errors •