CISA KEV 정보
| 취약점명 | Microsoft Office Remote Code Execution |
|---|---|
| 설명 | Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-94 |
| 등록일 (KEV) | 2026-04-14 |
| 조치 기한 | 2026-04-28 |
| 추가 참고 | https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0238 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVSS v2.0: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C설명: Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microsoft Office 2004 and 2008 for Mac allow remote attackers to execute arbitrary code via a crafted Excel document that triggers an access attempt on an invalid object, as exploited in the wild in February 2009 by Trojan.Mdropper.AC.
CWE: CWE-94 | CWE-94
참조
- http://blogs.zdnet.com/security/?p=2658
- http://isc.sans.org/diary.html?storyid=5923
- http://securitytracker.com/id?1021744
- http://www.microsoft.com/technet/security/advisory/968272.mspx [Vendor Advisory]
- http://www.securityfocus.com/bid/33870
- http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99
- http://www.us-cert.gov/cas/techalerts/TA09-104A.html [US Government Resource]
- http://www.vupen.com/english/advisories/2009/1023
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48875
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5968
- http://blogs.zdnet.com/security/?p=2658
- http://isc.sans.org/diary.html?storyid=5923
- http://securitytracker.com/id?1021744
- http://www.microsoft.com/technet/security/advisory/968272.mspx [Vendor Advisory]
- ... 외 8건
This product uses the NVD API but is not endorsed or certified by the NVD.