National Cyber-Alert System
Vulnerability Summary for CVE-2009-0556
Original release date:04/03/2009
Last revised:05/23/2009
Source:
US-CERT/NIST
Overview
Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."
Impact
CVSS Severity (version 2.0):
Impact Subscore:
10.0
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type:Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
US-CERT Technical Alert: TA09-132A
Name: TA09-132A
US-CERT Vulnerability Note: VU#627331
Name: VU#627331
External Source: MS
Name: MS09-017
Type: Advisory; Patch Information
External Source: CONFIRM
Name: http://www.microsoft.com/technet/security/advisory/969136.mspx
Type: Advisory; Patch Information
External Source: XF
Name: powerpoint-unspecified-code-execution(49632)
External Source: MISC
Name: http://www.zerodayinitiative.com/advisories/ZDI-09-019
External Source: VUPEN
Name: ADV-2009-1290
External Source: VUPEN
Name: ADV-2009-0915
Type: Advisory
External Source: SECTRACK
Name: 1021967
External Source: BID
Name: 34351
External Source: BUGTRAQ
Name: 20090512 ZDI-09-019: Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Vulnerability
External Source: SECUNIA
Name: 34572
Type: Advisory
External Source: OSVDB
Name: 53182
External Source: CONFIRM
Name: http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx
Type: Advisory
External Source: CONFIRM
Name: http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
Type: Advisory
External Source: CONFIRM
Name: http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx
Type: Advisory