9.3
CVSSv2

CVE-2008-0320

Published: 17/04/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the OLE importer in OpenOffice.org prior to 2.4 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.

Vulnerable Product Search on Vulmon Subscribe to Product

openoffice openoffice.org 2.2

openoffice openoffice.org 2.2.1

openoffice openoffice.org 2.3

openoffice openoffice.org

openoffice openoffice.org 2.0.3

openoffice openoffice.org 2.1

Vendor Advisories

It was discovered that arbitrary Java methods were not filtered out when opening databases in OpenOfficeorg If a user were tricked into running a specially crafted query, a remote attacker could execute arbitrary Java with user privileges (CVE-2007-4575) ...
Several security related problems have been discovered in OpenOfficeorg, the free office suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5745, CVE-2007-5747 Several bugs have been discovered in the way OpenOfficeorg parses Quattro Pro files that may lead to a overflow in the heap po ...

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::F ...
This Metasploit module exploits a vulnerability in OpenOffice 231 and 230 on Microsoft Windows XP SP3 By supplying a OLE file with a malformed DocumentSummaryInformation stream, an attacker can gain control of the execution flow, which results arbitrary code execution under the context of the user ...

References

CWE-119http://www.openoffice.org/security/bulletin.htmlhttp://www.debian.org/security/2008/dsa-1547http://www.redhat.com/support/errata/RHSA-2008-0175.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0176.htmlhttp://secunia.com/advisories/29864http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=694http://www.openoffice.org/security/cves/CVE-2008-0320.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00448.htmlhttp://secunia.com/advisories/29913http://www.openoffice.org/security/cves/CVE-2007-4770.htmlhttp://www.openoffice.org/security/cves/CVE-2007-5745.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:090http://sunsolve.sun.com/search/document.do?assetkey=1-26-231642-1http://www.novell.com/linux/security/advisories/2008_23_openoffice.htmlhttp://www.securityfocus.com/bid/28819http://www.securitytracker.com/id?1019890http://secunia.com/advisories/29852http://secunia.com/advisories/29910http://secunia.com/advisories/29844http://secunia.com/advisories/29871http://secunia.com/advisories/29987http://www.mandriva.com/security/advisories?name=MDVSA-2008:095http://secunia.com/advisories/30100http://www.ubuntu.com/usn/usn-609-1http://security.gentoo.org/glsa/glsa-200805-16.xmlhttp://secunia.com/advisories/30179http://www.vupen.com/english/advisories/2008/1253/referenceshttp://www.vupen.com/english/advisories/2008/1375/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41860https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10318https://usn.ubuntu.com/609-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/18923/