CVE-2009-0556

8.8 HIGH CISA KEV - Actively Exploited
Published: April 03, 2009 Modified: January 08, 2026
View on NVD

Description

Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/53182
Source: secure@microsoft.com
http://secunia.com/advisories/34572
Source: secure@microsoft.com
Vendor Advisory
http://www.kb.cert.org/vuls/id/627331
Source: secure@microsoft.com
US Government Resource
http://www.microsoft.com/technet/security/advisory/969136.mspx
Source: secure@microsoft.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/34351
Source: secure@microsoft.com
http://www.securitytracker.com/id?1021967
Source: secure@microsoft.com
http://www.us-cert.gov/cas/techalerts/TA09-132A.html
Source: secure@microsoft.com
US Government Resource
http://www.vupen.com/english/advisories/2009/0915
Source: secure@microsoft.com
Vendor Advisory
http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://osvdb.org/53182
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34572
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.kb.cert.org/vuls/id/627331
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.microsoft.com/technet/security/advisory/969136.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/archive/1/503453/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/34351
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021967
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-132A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2009/0915
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1290
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.zerodayinitiative.com/advisories/ZDI-09-019
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/49632
Source: af854a3a-2127-422b-91ae-364da2661108

37 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
78.5%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2026-01-28

Weaknesses (CWE)

Affected Vendors

microsoft