First published: Tue May 12 2009(Updated: )
Stack-based buffer overflow in the PowerPoint 4.2 conversion filter (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a large number of structures in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0226, and CVE-2009-1137.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft PowerPoint | =2000-sp3 | |
Microsoft PowerPoint | =2002-sp3 | |
Microsoft PowerPoint | =2003-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0227 is classified as a high severity vulnerability due to its ability to allow remote attackers to execute arbitrary code.
To fix CVE-2009-0227, you should apply the relevant security updates from Microsoft for affected versions of PowerPoint.
CVE-2009-0227 affects Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3.
CVE-2009-0227 is a stack-based buffer overflow vulnerability in the PowerPoint 4.2 conversion filter.
Yes, CVE-2009-0227 can be exploited remotely through malicious PowerPoint files containing crafted sound data.