CVE-2009-0557

Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*

History

28 Jun 2024, 14:15

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.8
References () http://osvdb.org/54953 - () http://osvdb.org/54953 - Broken Link
References () http://www.securityfocus.com/bid/35241 - () http://www.securityfocus.com/bid/35241 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1022351 - () http://www.securitytracker.com/id?1022351 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA09-160A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-160A.html - Broken Link, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2009/1540 - () http://www.vupen.com/english/advisories/2009/1540 - Broken Link
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 - Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5564 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5564 - Broken Link
CPE cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel:2007:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel_viewer:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel:2000:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*
cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel:2003:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*
cpe:2.3:a:microsoft:office_excel:2007:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*

Information

Published : 2009-06-10 18:30

Updated : 2024-06-28 14:15


NVD link : CVE-2009-0557

Mitre link : CVE-2009-0557

CVE.ORG link : CVE-2009-0557


JSON object : View

Products Affected

microsoft

  • office_excel_viewer
  • office_sharepoint_server
  • office
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')