CVE-2009-0565
Published Jun 10, 2009
Last updated 6 years ago
Overview
- Description
- Buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a malformed record that triggers memory corruption, aka "Word Buffer Overflow Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25" }, { "criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34C5FEAD-4B4B-44EB-9F3A-05093347A2F1" }, { "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3382DE96-A3CD-4094-9828-2955472BBE2D" }, { "criteria": "cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1B2B207-751F-4596-B805-B4622E312B93" }, { "criteria": "cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E99B12F-0DB7-4D0F-AD54-DD906CC8E3BD" }, { "criteria": "cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDA5243A-BA58-41BC-8FFC-317239E511C2" }, { "criteria": "cpe:2.3:a:microsoft:office_word:2007:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "413DBB72-E807-46EC-AD7B-4D62C6217CCB" }, { "criteria": "cpe:2.3:a:microsoft:office_word:2007:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B3ECA7D-1B9B-44EF-B76C-01CB36CCC33E" }, { "criteria": "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E647A7B3-7A92-4584-BDA7-81752FF59411" }, { "criteria": "cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4B148CC-6C58-411B-8503-01F3BE1D5906" }, { "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E" } ], "operator": "OR" } ] } ]