9.3

CVE-2009-0557

Warning

Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."

Data is provided by the National Vulnerability Database (NVD)
MicrosoftOffice Version2000 Updatesp3
MicrosoftOffice Version2003 Updatesp3
MicrosoftOffice Version2004 SwPlatformmacos
MicrosoftOffice Version2007 Updatesp1
MicrosoftOffice Version2007 Updatesp2
MicrosoftOffice Version2008 SwPlatformmacos
MicrosoftOffice Versionxp Updatesp3
MicrosoftOffice Compatibility Pack Version2007 Updatesp1
MicrosoftOffice Compatibility Pack Version2007 Updatesp2
MicrosoftOffice Excel Viewer Version2003 Updatesp3
MicrosoftOffice Sharepoint Server Version2007 Updatesp1
MicrosoftOffice Sharepoint Server Version2007 Updatesp2
MicrosoftOpen Xml File Format Converter Version- SwPlatformmacos

08.06.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Office Object Record Corruption Vulnerability

Vulnerability

Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 83.76% 0.992
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.