|
|
|
|
| |
Credit:
The information has been provided by NGSSoftware Security.
The original article can be found at: http://www.ngssoftware.com/advisories/openoffice.txt
The vendor advisory can be found at: http://www.openoffice.org/security/CVE-2006-3117.html
|
| |
Vulnerable Systems:
* OpenOffice version 1.1.5
* OpenOffice version 2.0.2
* OpenOffice version 2.0.1.1
* StarOffice version 6 Office Suite
* StarOffice version 7
* StarSuite version 7
* StarSuite version 8
Immune Systems:
* OpenOffice.org version 2.0.3
Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-complicit attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."
Vendor Status:
OpenOffice has issued a patch for version 1.1.5.
Sun has released a patch for versions 7 and 8. The patch available at: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1
CVE Information:
CVE-2006-3117
|
|
|
|
|