OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - Third Party Advisory | |
References | () http://secunia.com/advisories/40070 - Broken Link | |
References | () http://secunia.com/advisories/40084 - Broken Link | |
References | () http://secunia.com/advisories/40104 - Broken Link | |
References | () http://secunia.com/advisories/40107 - Broken Link | |
References | () http://secunia.com/advisories/41818 - Broken Link | |
References | () http://secunia.com/advisories/60799 - Broken Link | |
References | () http://ubuntu.com/usn/usn-949-1 - Third Party Advisory | |
References | () http://www.debian.org/security/2010/dsa-2055 - Third Party Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:221 - Broken Link | |
References | () http://www.openoffice.org/security/cves/CVE-2010-0395.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0459.html - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-287A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/1350 - Broken Link, Patch | |
References | () http://www.vupen.com/english/advisories/2010/1353 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1366 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1369 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/2905 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=574119 - Issue Tracking, Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091 - Tool Signature |
Information
Published : 2010-06-10 00:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0395
Mitre link : CVE-2010-0395
CVE.ORG link : CVE-2010-0395
JSON object : View
Products Affected
opensuse
- opensuse
canonical
- ubuntu_linux
suse
- linux_enterprise_desktop
apache
- openoffice
debian
- debian_linux
fedoraproject
- fedora
CWE