Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2009-0556
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability.".
CVSSv2.0 Score
- Severity
- High
- Base Score
- 9.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:microsoft:powerpoint:2000:sp3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:powerpoint:2002:sp3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:microsoft:office_powerpoint:2004:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
- http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-fil
- http://www.microsoft.com/technet/security/advisory/969136.mspx
- http://www.securityfocus.com/bid/34351
- http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.a
- http://www.kb.cert.org/vuls/id/627331
- http://www.securitytracker.com/id?1021967
- http://osvdb.org/53182
- http://www.vupen.com/english/advisories/2009/0915
- http://secunia.com/advisories/34572
- http://www.vupen.com/english/advisories/2009/1290
- http://www.us-cert.gov/cas/techalerts/TA09-132A.html
- http://www.zerodayinitiative.com/advisories/ZDI-09-019
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49632
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6
- http://www.securityfocus.com/archive/1/503453/100/0/threaded
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017