9.3
CVSSv2

CVE-2009-0563

Published: 10/06/2009 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote malicious users to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office 2004

microsoft office 2008

microsoft office compatibility pack for word excel ppt 2007

microsoft office word 2003

microsoft office word 2007

microsoft open xml file format converter

microsoft office word 2002

microsoft office word 2000

microsoft office word viewer 2003

microsoft office word viewer

Recent Articles

New Uyghur and Tibetan Themed Attacks Using PDF Exploits
Securelist • Igor Soumenkov Costin Raiu • 14 Mar 2013

On Feb 12th 2013, FireEye announced the discovery of an Adobe Reader 0-day exploit which is used to drop a previously unknown, advanced piece of malware. We called this new malware “ItaDuke” because it reminded us of Duqu and because of the ancient Italian comments in the shellcode copied from Dante Alighieri’s “Divine Comedy”. Previously, we posted about another campaign hitting Governments and other institutions, named Miniduke, which was also using the same “Divine Comedy” PDF e...

Cyber Attacks Against Uyghur Mac OS X Users Intensify
Securelist • Kurt Baumgartner Costin Raiu • 13 Feb 2013

In partnership with researchers at AlienVault Labs, we ve analysed a series of targeted attacks against Uyghur Mac OS X users which took place during the past months. You can read their analysis here. For our research, please read below. We previously wrote about targeted attacks against Tibetan activists which used Mac OS X malware. In addition to these, last June we reported about attacks using Mac OS X malware against Uyghur supporters. These later attacks took advantage of social engineering...

New MacOS X backdoor variant used in APT attacks
Securelist • Costin Raiu • 29 Jun 2012

Two days ago we intercepted a new APT campaign using a new MacOS X backdoor variant targeted at Uyghur activists. But before we go into details, let’s start with a quiz: – The Dalai Lama walks into an Apple Store. Why? A possible answer is, “to buy one of the new MacBook Pro’s with the Retina display!” (speaking of which, I would very much like to buy one of those as well, but it’s kind of difficult to justify the hit to the family budget) Joke aside, actually Dalai Lama is a well kn...

New MacOS X backdoor variant used in APT attacks
Securelist • Costin Raiu • 29 Jun 2012

Two days ago we intercepted a new APT campaign using a new MacOS X backdoor variant targeted at Uyghur activists. But before we go into details, let’s start with a quiz: – The Dalai Lama walks into an Apple Store. Why? A possible answer is, “to buy one of the new MacBook Pro’s with the Retina display!” (speaking of which, I would very much like to buy one of those as well, but it’s kind of difficult to justify the hit to the family budget) Joke aside, actually Dalai Lama is a well kn...

Monthly Malware Review, March 2012
Securelist • GReAT • 16 Apr 2012

The investigation into the Duqu Trojan is into its sixth month, and March brought further progress as we were able to establish which language was used for its Framework code. This discovery was made with the help of the international IT community, from which we received several hundred possible explanations and hypotheses. The Duqu Framework was written in C and compiled with MSVC 2008 with the options “/O1” and “/Ob1”. Its creators most probably used the object-oriented extension of th...

New Version of OSX.SabPub & Confirmed Mac APT attacks
Securelist • Costin Raiu • 16 Apr 2012

Late last week, we found evidence of a possible link between a Mac OS X backdoor trojan and an APT attack known as LuckyCat. The IP address of the C&C to which this bot connects (199.192.152.*) was also used in other Windows malware samples during 2011, which made us believe we were looking at the same entity behind these attacks. For the past two days, we have been monitoring a “fake” infected system – which is a typical procedure we do for APT bots. We were extremely surprised when d...

Yet another OSX/Java Trojan spotted in the wild
The Register • Richard Chirgwin • 15 Apr 2012

Kaspersky Lab tags MS Word as the vector

Hard on the heels of the Flashback Trojan, Kaspersky Lab is warning of a new OSX threat, which it’s dubbed Backdoor.OSX.SabPub.a. In a post to Securelist, Kaspersky’s Costin Raiu says the Trojan connects to a command and control server hosted on a Californian-based VPS associated with the Onedumb.com free DNS. Apparently a month old, the Trojan uses a Java exploit given the name Exploit.Java.CVE-2012-0507.bf in the Kaspersky post, with the ZelixKlassMaster obfuscator to try and get past malw...