9.3
CVSSv2

CVE-2009-3129

Published: 11/11/2009 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote malicious users to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft excel 2007

microsoft compatibility pack word excel powerpoint 2007

microsoft excel 2003

microsoft open xml file format converter

microsoft excel viewer 2003

microsoft excel viewer

microsoft excel 2002

microsoft office 2004

microsoft office 2008

Exploits

Microsoft Excel Featheader buffer overflow exploit that leverages the vulnerability noted in MS09-067 ...
#MS Excel Malformed FEATHEADER Record Exploit #CVE-2009-3129, MS09-067, OSVDB-59860 #Vulnerble application MS office 2003/2007 #Tested on XP SP2 - MS Ofice 2003 v 1156045606 #Sean Larsson - Original Discovery #!/usr/bin/python import sys import zlib #Allwin WinExec cmdexe + ExitProcess Shellcode - 195 bytes by RubberDuck =) shellcode = ( b"\ ...
## # $Id: ms09_067_excel_featheaderrb 10477 2010-09-25 11:59:02Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...

Recent Articles

The Epic Turla Operation
Securelist • GReAT • 07 Aug 2014

Technical Appendix with IOCs Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call “Epic Turla”. The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including government institutions, embassies, military, education, research and pharmaceutical companies. The attacks are known to have used at least two zero-day exploits: We also observed exploits against older (patched) vulnerabilities,...

Kaspersky Security Bulletin 2013. Corporate threats
Securelist • Vitaly Kamluk Sergey Lozhkin • 05 Dec 2013

Tat’jana Šerbakova PDF Version The number of serious cyber-attacks detected over the last two years has increased so much that new attacks rarely cause much surprise. It’s now commonplace for antivirus companies to issue a report about the discovery of another botnet or highly sophisticated malware campaign that is gathering data. Companies are increasingly falling victim to cyber-attacks. According to a survey conducted by Kaspersky Lab and B2B International, 91% of the organizations polle...

Android Trojan Found in Targeted Attack
Securelist • Kurt Baumgartner Costin Raiu Denis Maslennikov • 26 Mar 2013

In the past, we’ve seen targeted attacks against Tibetan and Uyghur activists on Windows and Mac OS X platforms. We’ve documented several interesting attacks (A Gift for Dalai Lamas Birthday and Cyber Attacks Against Uyghur Mac OS X Users Intensify) which used ZIP files as well as DOC, XLS and PDF documents rigged with exploits. Several days ago, the e-mail account of a high-profile Tibetan activist was hacked and used to send targeted attacks to other activists and human rights advocates. P...

“Red October”. Detailed Malware Description 1. First Stage of Attack
Securelist • GReAT • 17 Jan 2013

Based on the analysis of known cases, we identified two main ways through which Backdoor.Win32.Sputnik infects the victims. Both methods rely on spear-phishing e-mails which are sent to the prospective victims. The e-mails contain an attachment which is either an Excel or Word document, with enticing names. In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also inf...

Red October – Java Exploit Delivery Vector Analysis
Securelist • GReAT • 16 Jan 2013

Since the publication of our report, our colleagues from Seculert have discovered and posted a blog about the usage of another delivery vector in the Red October attacks. In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also infiltrated victim network(s) via Java exploitation (MD5: 35f1572eb7759cb7a66ca459c093e8a1 – ‘NewsFinder.jar’), known as the ‘Rhino’ exploit (CVE-2011-3544). We know the early February 2012 timeframe that ...

“Red October” Diplomatic Cyber Attacks Investigation
Securelist • GReAT • 14 Jan 2013

In October 2012, Kaspersky Lab’s Global Research & Analysis Team initiated a new threat research after a series of attacks against computer networks of various international diplomatic service agencies. A large scale cyber-espionage network was revealed and analyzed during the investigation, which we called “Red October” (after famous novel “The Hunt For The Red October”). This report is based on detailed technical analysis of a series of targeted attacks against diplomatic, govern...