Vulnerability Name: | CVE-2006-6628 (CCN-30947) | ||||||||
Assigned: | 2006-12-15 | ||||||||
Published: | 2006-12-15 | ||||||||
Updated: | 2018-10-17 | ||||||||
Summary: | Integer overflow in OpenOffice.org (OOo) 2.1 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted DOC file, as demonstrated by the 12122006-djtest.doc file, a variant of CVE-2006-6561 in a separate codebase. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:UR)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri Dec 15 2006 - 03:49:54 CST Flaw in OpenOffice.org 2.1: OpenOffice 2.1 is vulnerable to MS Word 0 day vulnerability!!! Source: MITRE Type: CNA CVE-2006-6628 Source: SREASON Type: UNKNOWN 2043 Source: MISC Type: Exploit http://www.milw0rm.com/sploits/12122006-djtest.doc Source: CCN Type: OpenOffice.org Web site OpenOffice.org Source: BUGTRAQ Type: UNKNOWN 20061215 Flaw in OpenOffice.org 2.1: OpenOffice 2.1 is vulnerable to MS Word 0 day vulnerability!!! Source: BUGTRAQ Type: UNKNOWN 20061215 Re: Flaw in OpenOffice.org 2.1: OpenOffice 2.1 is vulnerable to MS Word 0 day vulnerability!!! Source: BUGTRAQ Type: UNKNOWN 20061217 Re: Flaw in OpenOffice.org 2.1: OpenOffice 2.1 is vulnerable to MS Word 0 day vulnerability!!! Source: BUGTRAQ Type: UNKNOWN 20061218 Re: Flaw in OpenOffice.org 2.1: OpenOffice 2.1 is vulnerable to MS Word 0 day vulnerability!!! Source: BID Type: Exploit 21618 Source: CCN Type: BID-21618 OpenOffice Remote Word File Integer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-5051 Source: XF Type: UNKNOWN openoffice-word-dos(30947) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |