← Voltar para CVEs
CVE-2009-3129
HIGHCISA KEV7.8
Descricao
Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability."
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado11/11/2009
Ultima modificacao4/22/2026
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorMicrosoft
ProdutoExcel
Nome da vulnerabilidadeMicrosoft Excel Featheader Record Memory Corruption Vulnerability
Data inclusao KEV2022-03-03
Prazo de remediacao2022-03-24
Uso em ransomwareUnknown
Produtos afetados
microsoft:excelmicrosoft:excel_viewermicrosoft:officemicrosoft:open_xml_file_format_converter
Fraquezas (CWE)
CWE-787CWE-787
Referencias
http://archives.neohapsis.com/archives/bugtraq/2009-11/0080.html(secure@microsoft.com)
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=832(secure@microsoft.com)
http://osvdb.org/59860(secure@microsoft.com)
http://www.exploit-db.com/exploits/14706(secure@microsoft.com)
http://www.securityfocus.com/bid/36945(secure@microsoft.com)
http://www.securitytracker.com/id?1023157(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA09-314A.html(secure@microsoft.com)
http://www.zerodayinitiative.com/advisories/ZDI-09-083(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6521(secure@microsoft.com)
http://archives.neohapsis.com/archives/bugtraq/2009-11/0080.html(af854a3a-2127-422b-91ae-364da2661108)
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=832(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/59860(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/14706(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36945(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1023157(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA09-314A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-09-083(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6521(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-3129(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.