CVE-2009-0556
Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."
Vulnerabilidad inespecífica en Microsoft Office PowerPoint 2000 SP3, 2002 SP3, y 2003 SP3, y PowerPoint en Microsoft Office 2004 para Mac, permite a atacantes remotos ejecutar código arbitrario a través de un fichero PowerPoint que inicia un acceso a un "objeto no valido en memoria", Esta siendo explotado desde Abril 2009 mediante un exploit; Win32/Apptom.gen
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. Exploitation requires that the attacker coerce the target into opening a malicious .PPT file.
The specific flaw exists in the parsing of the OutlineTextRefAtom (3998). By specifying an invalid "index" value during parsing memory corruption occurs. Proper exploitation can lead to remote code execution under the credentials of the currently logged in user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-02-12 CVE Reserved
- 2009-04-03 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://osvdb.org/53182 | Vdb Entry | |
http://www.kb.cert.org/vuls/id/627331 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/503453/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/34351 | Vdb Entry | |
http://www.securitytracker.com/id?1021967 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA09-132A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2009/1290 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-09-019 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49632 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.microsoft.com/technet/security/advisory/969136.mspx | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Office Powerpoint Search vendor "Microsoft" for product "Office Powerpoint" | 2004 Search vendor "Microsoft" for product "Office Powerpoint" and version "2004" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Powerpoint Search vendor "Microsoft" for product "Powerpoint" | 2000 Search vendor "Microsoft" for product "Powerpoint" and version "2000" | sp3 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Powerpoint Search vendor "Microsoft" for product "Powerpoint" | 2002 Search vendor "Microsoft" for product "Powerpoint" and version "2002" | sp3 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Powerpoint Search vendor "Microsoft" for product "Powerpoint" | 2003 Search vendor "Microsoft" for product "Powerpoint" and version "2003" | sp3 |
Affected
|