2024-07-14 02:06:08 +00:00

131 lines
4.5 KiB
JSON

{
"id": "CVE-2009-0220",
"sourceIdentifier": "secure@microsoft.com",
"published": "2009-05-12T22:30:00.187",
"lastModified": "2018-10-12T21:50:08.817",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the PowerPoint 4.0 importer (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allow remote attackers to execute arbitrary code via crafted formatting data for paragraphs in a file that uses a PowerPoint 4.0 native file format, related to (1) an incorrect calculation from a record header, or (2) an interget that is used to specify the number of bytes to copy, aka \"Legacy File Format Vulnerability.\""
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en la regi\u00f3n stack de la memoria en el importador de PowerPoint versi\u00f3n 4.0 (biblioteca PP4X32. DLL) en Office PowerPoint 2000 SP3, 2002 SP3 y 2003 SP3 de Microsoft, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de datos de formato dise\u00f1ados para p\u00e1rrafos en un archivo que utiliza un formato de archivo nativo de PowerPoint versi\u00f3n 4.0 , relacionado con (1) un c\u00e1lculo incorrecto a partir de un encabezado record, o (2) un interget que se utiliza para especificar el n\u00famero de bytes a copiar, tambi\u00e9n se conoce como \"Legacy File Format Vulnerability\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_powerpoint:2000:sp3:*:*:*:*:*:*",
"matchCriteriaId": "34EA27E8-657D-4600-936C-423D753880F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_powerpoint:2002:sp3:*:*:*:*:*:*",
"matchCriteriaId": "FC12B313-5CBB-4590-A252-C6A406772CAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_powerpoint:2003:sp3:*:*:*:*:*:*",
"matchCriteriaId": "F57325F6-A2E0-4127-9A2F-DE6929AB29F3"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=790",
"source": "secure@microsoft.com"
},
{
"url": "http://osvdb.org/54386",
"source": "secure@microsoft.com"
},
{
"url": "http://secunia.com/advisories/32428",
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34833",
"source": "secure@microsoft.com"
},
{
"url": "http://www.securitytracker.com/id?1022205",
"source": "secure@microsoft.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA09-132A.html",
"source": "secure@microsoft.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/1290",
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017",
"source": "secure@microsoft.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5610",
"source": "secure@microsoft.com"
}
]
}