Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-0226 | First vendor Publication | 2009-05-12 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Stack-based buffer overflow in the PowerPoint 4.2 conversion filter in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a long string in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0227, and CVE-2009-1137. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0226 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6106 | |||
Oval ID: | oval:org.mitre.oval:def:6106 | ||
Title: | Legacy File Format Vulnerability | ||
Description: | Stack-based buffer overflow in the PowerPoint 4.2 conversion filter in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a long string in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0227, and CVE-2009-1137. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-0226 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista | Product(s): | Microsoft Office PowerPoint 2000 Service Pack 3 Microsoft Office PowerPoint 2002 Service Pack 3 Microsoft Office PowerPoint 2003 Service Pack 3 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
SAINT Exploits
Description | Link |
---|---|
Microsoft PowerPoint Legacy Format Scheme record buffer overflow | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2009-04-07 | Name : Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340) File : nvt/gb_ms_powerpoint_code_exec_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
54385 | Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Mem... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-05-14 | IAVM : 2009-A-0039 - Multiple Vulnerabilities in Microsoft Office PowerPoint Severity : Category I - VMSKEY : V0019159 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-10-10 | Microsoft PowerPoint CString atom overflow attempt RuleID : 44304 - Revision : 2 - Type : FILE-OFFICE |
2017-10-10 | Microsoft PowerPoint CString atom overflow attempt RuleID : 44303 - Revision : 2 - Type : FILE-OFFICE |
2014-01-23 | Microsoft Office PowerPoint MasterPagePackedText structure CharacterFormatArr... RuleID : 29033 - Revision : 2 - Type : FILE-OFFICE |
2014-01-23 | Microsoft Office PowerPoint MasterPagePackedText structure CharacterFormatArr... RuleID : 29032 - Revision : 2 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint schemes record buffer overflow RuleID : 27215 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint PP7 Component buffer overflow attempt RuleID : 23538 - Revision : 6 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint HashCode10Atom memory corruption attempt RuleID : 23537 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint CurrentUserAtom remote code execution attempt RuleID : 23536 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint Download of version 4.0 file RuleID : 23535 - Revision : 4 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint CurrentUserAtom remote code execution attempt RuleID : 15506 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint HashCode10Atom memory corruption attempt RuleID : 15505 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint Download of version 4.0 file RuleID : 15504 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Download of PowerPoint 95 file RuleID : 15503 - Revision : 6 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint DiagramBuildContainer memory corruption attempt RuleID : 15502 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint ParaBuildAtom memory corruption attempt RuleID : 15501 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint LinkedSlide memory corruption RuleID : 15500 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint PP7 Component buffer overflow attempt RuleID : 15499 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft PowerPoint CString atom overflow attempt RuleID : 15498 - Revision : 9 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office PowerPoint malformed msofbtTextbox exploit attempt RuleID : 15454 - Revision : 12 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-20 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_office_jun2009.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : Arbitrary code can be executed on the remote host through Microsoft PowerPoint. File : smb_nt_ms09-017.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:11:21 |
|
2024-11-28 12:18:08 |
|
2021-05-04 12:09:02 |
|
2021-04-22 01:09:23 |
|
2020-05-23 00:23:15 |
|
2018-10-13 00:22:46 |
|
2017-09-29 09:24:02 |
|
2016-04-26 18:34:24 |
|
2014-02-17 10:48:29 |
|
2014-01-19 21:25:37 |
|
2013-11-11 12:38:11 |
|
2013-05-10 23:42:50 |
|