Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2009-0556
PUBLISHED
More InfoOfficial Page
Assigner-microsoft
Assigner Org ID-f38d906d-7342-40ea-92c1-6c4a2c6478c8
View Known Exploited Vulnerability (KEV) details
Published At-03 Apr, 2009 | 18:00
Updated At-08 Jan, 2026 | 04:55
Rejected At-
▼CVE Numbering Authority (CNA)

Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.zerodayinitiative.com/advisories/ZDI-09-019
x_refsource_MISC
http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/1290
vdb-entry
x_refsource_VUPEN
http://osvdb.org/53182
vdb-entry
x_refsource_OSVDB
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017
vendor-advisory
x_refsource_MS
https://exchange.xforce.ibmcloud.com/vulnerabilities/49632
vdb-entry
x_refsource_XF
http://www.securityfocus.com/bid/34351
vdb-entry
x_refsource_BID
http://www.vupen.com/english/advisories/2009/0915
vdb-entry
x_refsource_VUPEN
http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
x_refsource_CONFIRM
http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx
x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/34572
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1021967
vdb-entry
x_refsource_SECTRACK
http://www.us-cert.gov/cas/techalerts/TA09-132A.html
third-party-advisory
x_refsource_CERT
http://www.microsoft.com/technet/security/advisory/969136.mspx
x_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/627331
third-party-advisory
x_refsource_CERT-VN
http://www.securityfocus.com/archive/1/503453/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-09-019
Resource:
x_refsource_MISC
Hyperlink: http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2009/1290
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://osvdb.org/53182
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017
Resource:
vendor-advisory
x_refsource_MS
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/49632
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/bid/34351
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.vupen.com/english/advisories/2009/0915
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
Resource:
x_refsource_CONFIRM
Hyperlink: http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx
Resource:
x_refsource_CONFIRM
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/34572
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1021967
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA09-132A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.microsoft.com/technet/security/advisory/969136.mspx
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.kb.cert.org/vuls/id/627331
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://www.securityfocus.com/archive/1/503453/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204
Resource:
vdb-entry
signature
x_refsource_OVAL
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.zerodayinitiative.com/advisories/ZDI-09-019
x_refsource_MISC
x_transferred
http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2009/1290
vdb-entry
x_refsource_VUPEN
x_transferred
http://osvdb.org/53182
vdb-entry
x_refsource_OSVDB
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017
vendor-advisory
x_refsource_MS
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/49632
vdb-entry
x_refsource_XF
x_transferred
http://www.securityfocus.com/bid/34351
vdb-entry
x_refsource_BID
x_transferred
http://www.vupen.com/english/advisories/2009/0915
vdb-entry
x_refsource_VUPEN
x_transferred
http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
x_refsource_CONFIRM
x_transferred
http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx
x_refsource_CONFIRM
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/34572
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1021967
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.us-cert.gov/cas/techalerts/TA09-132A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.microsoft.com/technet/security/advisory/969136.mspx
x_refsource_CONFIRM
x_transferred
http://www.kb.cert.org/vuls/id/627331
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://www.securityfocus.com/archive/1/503453/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-09-019
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/1290
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://osvdb.org/53182
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017
Resource:
vendor-advisory
x_refsource_MS
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/49632
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/bid/34351
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0915
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/34572
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1021967
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA09-132A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.microsoft.com/technet/security/advisory/969136.mspx
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/627331
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/503453/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-94CWE-94 Improper Control of Generation of Code ('Code Injection')
Type: CWE
CWE ID: CWE-94
Description: CWE-94 Improper Control of Generation of Code ('Code Injection')
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
kev
dateAdded:
2026-01-07
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-0556
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2009-0556 added to CISA KEV2026-01-07 00:00:00
Event: CVE-2009-0556 added to CISA KEV
Date: 2026-01-07 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-0556
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-0556
Resource:
government-resource
Details not found