Executive Summary

Informations
Name CVE-2009-2528 First vendor Publication 2009-10-14
Vendor Cve Last vendor Modification 2023-12-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

GDI+ in Microsoft Office XP SP3 does not properly handle malformed objects in Office Art Property Tables, which allows remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2528

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:6426
 
Oval ID: oval:org.mitre.oval:def:6426
Title: Memory Corruption Vulnerability
Description: GDI+ in Microsoft Office XP SP3 does not properly handle malformed objects in Office Art Property Tables, which allows remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-2528
Version: 4
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Office XP
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 2
Application 4
Application 2
Application 1
Application 2
Application 3
Application 1
Application 1
Application 1
Application 3
Application 6
Application 1
Application 1
Application 2
Application 2
Application 2
Application 1
Os 3
Os 3
Os 3
Os 3

SAINT Exploits

Description Link
Microsoft Office Art Property Table Memory Corruption More info here

OpenVAS Exploits

Date Description
2009-10-21 Name : Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
File : nvt/secpod_ms09-062.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
58869 Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code E...

Information Assurance Vulnerability Management (IAVM)

Date Description
2009-10-15 IAVM : 2009-A-0099 - Multiple Vulnerabilities in Microsoft GDI+
Severity : Category I - VMSKEY : V0021759

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Multiple Products malformed PNG detected tEXt overflow attempt
RuleID : 6700 - Revision : 20 - Type : FILE-IMAGE
2019-08-27 Microsoft Windows GDI+ interlaced PNG file parsing heap overflow attempt
RuleID : 50798 - Revision : 1 - Type : FILE-IMAGE
2016-03-14 Microsoft Windows malformed WMF meta escape record memory corruption attempt
RuleID : 36856 - Revision : 2 - Type : FILE-IMAGE
2015-03-19 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 33518 - Revision : 3 - Type : FILE-IMAGE
2015-03-19 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 33517 - Revision : 3 - Type : FILE-IMAGE
2015-03-19 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 33516 - Revision : 3 - Type : FILE-IMAGE
2015-03-19 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 33515 - Revision : 3 - Type : FILE-IMAGE
2015-01-15 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 32833 - Revision : 2 - Type : FILE-IMAGE
2015-01-15 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 32832 - Revision : 2 - Type : FILE-IMAGE
2015-01-15 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 32831 - Revision : 2 - Type : FILE-IMAGE
2015-01-15 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 32830 - Revision : 2 - Type : FILE-IMAGE
2015-01-15 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 32829 - Revision : 2 - Type : FILE-IMAGE
2015-01-15 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 32828 - Revision : 2 - Type : FILE-IMAGE
2014-03-27 Microsoft Multiple Products potentially malicious PNG detected - large or inv...
RuleID : 29945 - Revision : 4 - Type : FILE-IMAGE
2014-01-10 Microsoft Multiple Products malformed PNG detected tEXt overflow attempt
RuleID : 26865 - Revision : 4 - Type : FILE-IMAGE
2014-01-10 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 23590 - Revision : 7 - Type : FILE-IMAGE
2014-01-10 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 23589 - Revision : 8 - Type : FILE-IMAGE
2014-01-10 Microsoft Office Excel GDI+ Office Art Property Table remote code execution a...
RuleID : 23541 - Revision : 4 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Word GDI+ Office Art Property Table remote code execution at...
RuleID : 23540 - Revision : 4 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 21160 - Revision : 9 - Type : FILE-IMAGE
2014-01-10 Microsoft Windows GDI+ TIFF RLE compressed data buffer overflow attempt
RuleID : 16327 - Revision : 8 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows GDI+ interlaced PNG file parsing heap overflow attempt
RuleID : 16186 - Revision : 12 - Type : FILE-IMAGE
2014-01-10 Microsoft Windows GDI+ compressed TIFF file parsing remote code execution att...
RuleID : 16185 - Revision : 8 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows GDI+ TIFF file parsing heap overflow attempt
RuleID : 16184 - Revision : 16 - Type : FILE-IMAGE
2014-01-10 Microsoft Office Excel GDI+ Office Art Property Table remote code execution a...
RuleID : 16178 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Word GDI+ Office Art Property Table remote code execution at...
RuleID : 16177 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 GDI+ .NET image property parsing memory corruption
RuleID : 16154 - Revision : 9 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft Windows malformed WMF meta escape record memory corruption attempt
RuleID : 16153 - Revision : 13 - Type : FILE-IMAGE
2014-01-10 Windows BMP image conversion arbitrary code execution attempt
RuleID : 13879 - Revision : 13 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2014-03-10 Name : Arbitrary code can be executed on the remote host through the Microsoft GDI r...
File : smb_kb957488.nasl - Type : ACT_GATHER_INFO
2009-10-15 Name : Arbitrary code can be executed on the remote host through the Microsoft GDI r...
File : smb_nt_ms09-062.nasl - Type : ACT_GATHER_INFO
2003-01-26 Name : The remote host has a database server installed.
File : mssql_version.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CERT http://www.us-cert.gov/cas/techalerts/TA09-286A.html
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2023-12-07 21:28:05
  • Multiple Updates
2021-05-04 12:09:50
  • Multiple Updates
2021-04-22 01:10:11
  • Multiple Updates
2020-05-23 00:24:03
  • Multiple Updates
2018-10-13 00:22:51
  • Multiple Updates
2017-09-19 09:23:18
  • Multiple Updates
2016-08-31 12:01:50
  • Multiple Updates
2016-06-28 17:46:19
  • Multiple Updates
2016-04-26 18:59:00
  • Multiple Updates
2014-03-11 13:21:22
  • Multiple Updates
2014-02-17 10:50:53
  • Multiple Updates
2014-01-19 21:26:04
  • Multiple Updates
2013-11-11 12:38:23
  • Multiple Updates
2013-05-10 23:54:16
  • Multiple Updates