Vulnerability Name: | CVE-2007-0002 (CCN-33109) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2006-12-19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2007-03-16 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-16 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. Note: the integer overflow has been split into CVE-2007-1466. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-0002 Source: FEDORA Type: UNKNOWN FEDORA-2007-350 Source: IDEFENSE Type: UNKNOWN 20070316 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities Source: SUSE Type: UNKNOWN SUSE-SA:2007:023 Source: CCN Type: RHSA-2007-0055 Important: libwpd security update Source: SECUNIA Type: Vendor Advisory 24465 Source: CCN Type: SA24507 libwpd Multiple Heap-based Buffer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 24507 Source: SECUNIA Type: Vendor Advisory 24557 Source: SECUNIA Type: Vendor Advisory 24572 Source: SECUNIA Type: Vendor Advisory 24573 Source: SECUNIA Type: Vendor Advisory 24580 Source: SECUNIA Type: Vendor Advisory 24581 Source: CCN Type: SA24588 OpenOffice.org Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 24588 Source: SECUNIA Type: Vendor Advisory 24591 Source: SECUNIA Type: Vendor Advisory 24593 Source: SECUNIA Type: Vendor Advisory 24613 Source: SECUNIA Type: Vendor Advisory 24794 Source: CCN Type: SA24856 Sun StarOffice and StarSuite 8 WordPerfect Vulnerability Source: SECUNIA Type: Vendor Advisory 24856 Source: SECUNIA Type: Vendor Advisory 24906 Source: GENTOO Type: UNKNOWN GLSA-200704-07 Source: CCN Type: SECTRACK ID: 1017789 libwpd Buffer Overflows Let Remote Users Execute Arbitrary Code Source: SLACKWARE Type: UNKNOWN SSA-2007-085-02 Source: CCN Type: SourceForge.net: Files WordPerfect Document importer/exporter - File Release Notes and Changelog - Release Name: libwpd-0.8.9 Source: CONFIRM Type: UNKNOWN http://sourceforge.net/project/shownotes.php?release_id=494122 Source: CCN Type: libwpd Web site SourceForge.net: WordPerfect Document importer/exporter Source: CCN Type: Sun Alert ID: 102863 Security Vulnerability in StarOffice 8 May Lead to Heap Overflow and Arbitrary Code Execution Source: SUNALERT Type: UNKNOWN 102863 Source: CCN Type: ASA-2007-164 Security Vulnerability in StarOffice 8 May Lead to Heap Overflow and Arbitrary Code Execution (Sun 102863) Source: CCN Type: Abiword Web site AbiWord Source: DEBIAN Type: UNKNOWN DSA-1268 Source: DEBIAN Type: UNKNOWN DSA-1270 Source: DEBIAN Type: DSA-1268 libwpd -- integer overflow Source: DEBIAN Type: DSA-1270 openoffice.org -- several vulnerabilities Source: CCN Type: GLSA-200704-07 libwpd: Multiple vulnerabilities Source: CCN Type: GLSA-200704-12 OpenOffice.org: Multiple vulnerabilities Source: GENTOO Type: UNKNOWN GLSA-200704-12 Source: CCN Type: KWord Web site The KOffice Project - KWord Source: MANDRIVA Type: UNKNOWN MDKSA-2007:063 Source: MANDRIVA Type: UNKNOWN MDKSA-2007:064 Source: CCN Type: OpenOffice.org Web site OpenOffice.org: Home Source: REDHAT Type: Vendor Advisory RHSA-2007:0055 Source: BUGTRAQ Type: UNKNOWN 20070316 rPSA-2007-0057-1 libwpd Source: BID Type: UNKNOWN 23006 Source: CCN Type: BID-23006 LibWPD Library Multiple Buffer Overflow Vulnerabilities Source: SECTRACK Type: UNKNOWN 1017789 Source: CCN Type: TLSA-2007-27 Buffer overflow Source: CCN Type: USN-437-1 libwpd vulnerability Source: UBUNTU Type: UNKNOWN USN-437-1 Source: VUPEN Type: Vendor Advisory ADV-2007-0976 Source: VUPEN Type: Vendor Advisory ADV-2007-1032 Source: VUPEN Type: Vendor Advisory ADV-2007-1339 Source: XF Type: UNKNOWN libwpd-multiple-bo(33109) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 03.16.07 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11535 Source: SUSE Type: SUSE-SA:2007:023 OpenOffice_org security update | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |