ID CVE-2009-2506
Summary Integer overflow in the text converters in Microsoft Office Word 2002 SP3 and 2003 SP3; Works 8.5; Office Converter Pack; and WordPad in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a DOC file with an invalid number of property names in the DocumentSummaryInformation stream, which triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:office_converter_pack:*:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:office_converter_pack:*:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*
    cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*
    cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:wordpad:*:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:wordpad:*:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:works:8.5:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:works:8.5:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 26-02-2019 - 14:04)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
msbulletin via4
bulletin_id MS09-073
bulletin_url
date 2009-12-08T00:00:00
impact Remote Code Execution
knowledgebase_id 975539
knowledgebase_url
severity Important
title Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution
oval via4
accepted 2015-08-10T04:00:59.443-04:00
class vulnerability
contributors
  • name Dragos Prisaca
    organization Gideon Technologies, Inc.
  • name Dragos Prisaca
    organization Gideon Technologies, Inc.
  • name Dragos Prisaca
    organization Gideon Technologies, Inc.
  • name Rachana Shetty
    organization SecPod Technologies
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Dragos Prisaca
    organization G2, Inc.
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Microsoft Windows 2000 SP4 or later is installed
    oval oval:org.mitre.oval:def:229
  • comment Microsoft Windows XP (x86) SP3 is installed
    oval oval:org.mitre.oval:def:5631
  • comment Microsoft Windows Server 2003 SP2 (x86) is installed
    oval oval:org.mitre.oval:def:1935
  • comment Microsoft Office Converter Pack is installed
    oval oval:org.mitre.oval:def:28520
  • comment Microsoft Windows XP x64 Edition SP2 is installed
    oval oval:org.mitre.oval:def:4193
  • comment Microsoft Windows Server 2003 SP2 (x64) is installed
    oval oval:org.mitre.oval:def:2161
  • comment Microsoft Windows Server 2003 (ia64) SP2 is installed
    oval oval:org.mitre.oval:def:1442
  • comment Microsoft Office Converter Pack is installed
    oval oval:org.mitre.oval:def:28520
  • comment Microsoft Word 2002 is installed
    oval oval:org.mitre.oval:def:973
  • comment Microsoft Word 2003 is installed
    oval oval:org.mitre.oval:def:475
  • comment Microsoft Works 8.5 is installed
    oval oval:org.mitre.oval:def:6721
  • comment Microsoft Office Converter Pack is installed
    oval oval:org.mitre.oval:def:28520
  • comment Microsoft Office 2003 is installed
    oval oval:org.mitre.oval:def:233
description Integer overflow in the text converters in Microsoft Office Word 2002 SP3 and 2003 SP3; Works 8.5; Office Converter Pack; and WordPad in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a DOC file with an invalid number of property names in the DocumentSummaryInformation stream, which triggers a heap-based buffer overflow.
family windows
id oval:org.mitre.oval:def:5846
status accepted
submitted 2009-12-08T13:00:00
title WordPad and Office Text converter Memory Corruption Vulnerability
version 33
refmap via4
bid 37216
cert TA09-342A
confirm http://support.avaya.com/css/P8/documents/100070184
idefense 20091208 Microsoft WordPad Word97 Converter Integer Overflow Vulnerability
Last major update 26-02-2019 - 14:04
Published 09-12-2009 - 18:30
Last modified 26-02-2019 - 14:04
Back to Top