Vulnerability Name: | CVE-2006-4514 (CCN-30611) | ||||||||||||||||
Assigned: | 2006-11-30 | ||||||||||||||||
Published: | 2006-11-30 | ||||||||||||||||
Updated: | 2018-10-17 | ||||||||||||||||
Summary: | Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory. | ||||||||||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: SGI Type: UNKNOWN 20070101-01-P Source: MITRE Type: CNA CVE-2006-4514 Source: CCN Type: freshmeat.net Project details for GNOME Structured File Library Source: IDEFENSE Type: Vendor Advisory 20061130 Multiple Vendor libgsf Heap Overflow Vulnerability Source: SUSE Type: UNKNOWN SUSE-SA:2006:076 Source: CCN Type: RHSA-2007-0011 Moderate: libgsf security update Source: REDHAT Type: Vendor Advisory RHSA-2007:0011 Source: CCN Type: SA23164 GNOME Structured File Library "ole_info_read_metabat()" Buffer Overflow Source: SECUNIA Type: Vendor Advisory 23164 Source: SECUNIA Type: Vendor Advisory 23166 Source: SECUNIA Type: Vendor Advisory 23167 Source: SECUNIA Type: Vendor Advisory 23227 Source: SECUNIA Type: Vendor Advisory 23337 Source: SECUNIA Type: Vendor Advisory 23352 Source: SECUNIA Type: Vendor Advisory 23355 Source: SECUNIA Type: Vendor Advisory 23686 Source: SECUNIA Type: Vendor Advisory 23920 Source: CCN Type: SA51561 Oracle Solaris GNOME Structured File Library "ole_info_read_metabat()" Buffer Overflow Source: GENTOO Type: UNKNOWN GLSA-200612-13 Source: CCN Type: ASA-2007-065 libgsf security update (RHSA-2007-0011) Source: DEBIAN Type: Patch, Vendor Advisory DSA-1221 Source: DEBIAN Type: DSA-1221 libgsf -- buffer overflow Source: CCN Type: GLSA-200612-13 libgsf: Buffer overflow Source: MANDRIVA Type: UNKNOWN MDKSA-2006:220 Source: BUGTRAQ Type: UNKNOWN 20061214 rPSA-2006-0232-1 libgsf Source: BID Type: Patch 21358 Source: CCN Type: BID-21358 LibGSF Remote Heap Buffer Overflow Vulnerability Source: CCN Type: USN-391-1 libgsf vulnerability Source: UBUNTU Type: UNKNOWN USN-391-1 Source: VUPEN Type: Vendor Advisory ADV-2006-4784 Source: CONFIRM Type: UNKNOWN http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf Source: CCN Type: Oracle Security Blog, Dec 11, 2012 CVE-2006-4514 Buffer overflow vulnerability in Gnome Structured File library (libgsf) Source: XF Type: UNKNOWN libgsf-metabat-bo(30611) Source: XF Type: UNKNOWN libgsf-metabat-bo(30611) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-857 Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 11.30.06 Multiple Vendor libgsf Heap Overflow Vulnerability Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9413 Source: SUSE Type: SUSE-SA:2006:076 libgsf buffer overflows | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |