CVE-2006-3117

Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."
References
Link Resource
http://fedoranews.org/cms/node/2343
http://secunia.com/advisories/20867 Vendor Advisory
http://secunia.com/advisories/20893 Vendor Advisory
http://secunia.com/advisories/20910 Vendor Advisory
http://secunia.com/advisories/20911 Vendor Advisory
http://secunia.com/advisories/20913 Vendor Advisory
http://secunia.com/advisories/20975 Vendor Advisory
http://secunia.com/advisories/20995 Vendor Advisory
http://secunia.com/advisories/21278 Vendor Advisory
http://secunia.com/advisories/22129 Vendor Advisory
http://secunia.com/advisories/23620 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200607-12.xml
http://securitytracker.com/id?1016414
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1 Patch
http://www.debian.org/security/2006/dsa-1104
http://www.mandriva.com/security/advisories?name=MDKSA-2006:118
http://www.ngssoftware.com/advisories/openoffice.txt Patch
http://www.novell.com/linux/security/advisories/2006_40_openoffice.html
http://www.openoffice.org/security/CVE-2006-3117.html Patch
http://www.redhat.com/support/errata/RHSA-2006-0573.html Vendor Advisory
http://www.securityfocus.com/archive/1/447035/100/0/threaded
http://www.securityfocus.com/bid/18739
http://www.ubuntu.com/usn/usn-313-1
http://www.ubuntu.com/usn/usn-313-2
http://www.vupen.com/english/advisories/2006/2607 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2621 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27571
https://issues.rpath.com/browse/RPL-475
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704
http://fedoranews.org/cms/node/2343
http://secunia.com/advisories/20867 Vendor Advisory
http://secunia.com/advisories/20893 Vendor Advisory
http://secunia.com/advisories/20910 Vendor Advisory
http://secunia.com/advisories/20911 Vendor Advisory
http://secunia.com/advisories/20913 Vendor Advisory
http://secunia.com/advisories/20975 Vendor Advisory
http://secunia.com/advisories/20995 Vendor Advisory
http://secunia.com/advisories/21278 Vendor Advisory
http://secunia.com/advisories/22129 Vendor Advisory
http://secunia.com/advisories/23620 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200607-12.xml
http://securitytracker.com/id?1016414
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1 Patch
http://www.debian.org/security/2006/dsa-1104
http://www.mandriva.com/security/advisories?name=MDKSA-2006:118
http://www.ngssoftware.com/advisories/openoffice.txt Patch
http://www.novell.com/linux/security/advisories/2006_40_openoffice.html
http://www.openoffice.org/security/CVE-2006-3117.html Patch
http://www.redhat.com/support/errata/RHSA-2006-0573.html Vendor Advisory
http://www.securityfocus.com/archive/1/447035/100/0/threaded
http://www.securityfocus.com/bid/18739
http://www.ubuntu.com/usn/usn-313-1
http://www.ubuntu.com/usn/usn-313-2
http://www.vupen.com/english/advisories/2006/2607 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2621 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27571
https://issues.rpath.com/browse/RPL-475
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openoffice:openoffice:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:staroffice:6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:staroffice:7.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:staroffice:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://fedoranews.org/cms/node/2343 - () http://fedoranews.org/cms/node/2343 -
References () http://secunia.com/advisories/20867 - Vendor Advisory () http://secunia.com/advisories/20867 - Vendor Advisory
References () http://secunia.com/advisories/20893 - Vendor Advisory () http://secunia.com/advisories/20893 - Vendor Advisory
References () http://secunia.com/advisories/20910 - Vendor Advisory () http://secunia.com/advisories/20910 - Vendor Advisory
References () http://secunia.com/advisories/20911 - Vendor Advisory () http://secunia.com/advisories/20911 - Vendor Advisory
References () http://secunia.com/advisories/20913 - Vendor Advisory () http://secunia.com/advisories/20913 - Vendor Advisory
References () http://secunia.com/advisories/20975 - Vendor Advisory () http://secunia.com/advisories/20975 - Vendor Advisory
References () http://secunia.com/advisories/20995 - Vendor Advisory () http://secunia.com/advisories/20995 - Vendor Advisory
References () http://secunia.com/advisories/21278 - Vendor Advisory () http://secunia.com/advisories/21278 - Vendor Advisory
References () http://secunia.com/advisories/22129 - Vendor Advisory () http://secunia.com/advisories/22129 - Vendor Advisory
References () http://secunia.com/advisories/23620 - Vendor Advisory () http://secunia.com/advisories/23620 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200607-12.xml - () http://security.gentoo.org/glsa/glsa-200607-12.xml -
References () http://securitytracker.com/id?1016414 - () http://securitytracker.com/id?1016414 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1 - Patch () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1 - Patch
References () http://www.debian.org/security/2006/dsa-1104 - () http://www.debian.org/security/2006/dsa-1104 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:118 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:118 -
References () http://www.ngssoftware.com/advisories/openoffice.txt - Patch () http://www.ngssoftware.com/advisories/openoffice.txt - Patch
References () http://www.novell.com/linux/security/advisories/2006_40_openoffice.html - () http://www.novell.com/linux/security/advisories/2006_40_openoffice.html -
References () http://www.openoffice.org/security/CVE-2006-3117.html - Patch () http://www.openoffice.org/security/CVE-2006-3117.html - Patch
References () http://www.redhat.com/support/errata/RHSA-2006-0573.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0573.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/447035/100/0/threaded - () http://www.securityfocus.com/archive/1/447035/100/0/threaded -
References () http://www.securityfocus.com/bid/18739 - () http://www.securityfocus.com/bid/18739 -
References () http://www.ubuntu.com/usn/usn-313-1 - () http://www.ubuntu.com/usn/usn-313-1 -
References () http://www.ubuntu.com/usn/usn-313-2 - () http://www.ubuntu.com/usn/usn-313-2 -
References () http://www.vupen.com/english/advisories/2006/2607 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2607 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2621 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2621 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27571 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27571 -
References () https://issues.rpath.com/browse/RPL-475 - () https://issues.rpath.com/browse/RPL-475 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704 -

Information

Published : 2006-06-30 18:05

Updated : 2024-11-21 00:12


NVD link : CVE-2006-3117

Mitre link : CVE-2006-3117

CVE.ORG link : CVE-2006-3117


JSON object : View

Products Affected

sun

  • staroffice

openoffice

  • openoffice
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer