← Back to CVEs
CVE-2009-3129
HIGHCISA KEV7.8
Description
Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability."
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published11/11/2009
Last Modified4/22/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorMicrosoft
ProductExcel
Vulnerability NameMicrosoft Excel Featheader Record Memory Corruption Vulnerability
KEV Date Added2022-03-03
Remediation Due Date2022-03-24
Ransomware UseUnknown
Affected Products
microsoft:excelmicrosoft:excel_viewermicrosoft:officemicrosoft:open_xml_file_format_converter
Weaknesses (CWE)
CWE-787CWE-787
References
http://archives.neohapsis.com/archives/bugtraq/2009-11/0080.html(secure@microsoft.com)
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=832(secure@microsoft.com)
http://osvdb.org/59860(secure@microsoft.com)
http://www.exploit-db.com/exploits/14706(secure@microsoft.com)
http://www.securityfocus.com/bid/36945(secure@microsoft.com)
http://www.securitytracker.com/id?1023157(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA09-314A.html(secure@microsoft.com)
http://www.zerodayinitiative.com/advisories/ZDI-09-083(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6521(secure@microsoft.com)
http://archives.neohapsis.com/archives/bugtraq/2009-11/0080.html(af854a3a-2127-422b-91ae-364da2661108)
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=832(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/59860(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/14706(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36945(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1023157(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA09-314A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-09-083(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6521(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-3129(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.