CVE-2009-0224
Summary
| CVE | CVE-2009-0224 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-05-12 22:30:00 UTC |
| Updated | 2018-10-12 21:50:00 UTC |
| Description | Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; PowerPoint Viewer 2003 and 2007 SP1 and SP2; PowerPoint in Microsoft Office 2004 for Mac and 2008 for Mac; Open XML File Format Converter for Mac; Microsoft Works 8.5 and 9.0; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 do not properly validate PowerPoint files, which allows remote attackers to execute arbitrary code via multiple crafted BuildList records that include ChartBuild containers, which triggers memory corruption, aka "Memory Corruption Vulnerability." |
Risk And Classification
Problem Types: CWE-94
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Microsoft Security Bulletin MS09-017 - Critical | Microsoft Docs | MS | docs.microsoft.com | |
| SecurityTracker.com Archives - Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code | SECTRACK | www.securitytracker.com | |
| US-CERT Technical Cyber Security Alert TA09-132A -- Microsoft PowerPoint Multiple Vulnerabilities | CERT | www.us-cert.gov | US Government Resource |
| Public Advisory: 05.12.09 // iDefense Labs | IDEFENSE | labs.idefense.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Microsoft PowerPoint Multiple Vulnerabilities - Advisories - Community | SECUNIA | secunia.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Microsoft PowerPoint Invalid Record Type Remote Code Execution Vulnerability | BID | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.