Vulnerability Name: | CVE-2007-1466 (CCN-33110) | ||||||||||||||||||||
Assigned: | 2007-03-16 | ||||||||||||||||||||
Published: | 2007-03-16 | ||||||||||||||||||||
Updated: | 2018-10-16 | ||||||||||||||||||||
Summary: | Integer overflow in the WP6GeneralTextPacket::_readContents function in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file, a different vulnerability than CVE-2007-0002. | ||||||||||||||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-1466 Source: FEDORA Type: UNKNOWN FEDORA-2007-350 Source: IDEFENSE Type: UNKNOWN 20070316 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities Source: CCN Type: RHSA-2007-0033 Important: openoffice.org security update Source: CCN Type: RHSA-2007-0055 Important: libwpd security update Source: CCN Type: SA24507 libwpd Multiple Heap-based Buffer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 24507 Source: SECUNIA Type: Vendor Advisory 24550 Source: SECUNIA Type: Vendor Advisory 24557 Source: SECUNIA Type: Vendor Advisory 24572 Source: SECUNIA Type: Vendor Advisory 24573 Source: SECUNIA Type: Vendor Advisory 24580 Source: SECUNIA Type: Vendor Advisory 24581 Source: CCN Type: SA24588 OpenOffice.org Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 24588 Source: SECUNIA Type: Vendor Advisory 24794 Source: CCN Type: SA24856 Sun StarOffice and StarSuite 8 WordPerfect Vulnerability Source: SECUNIA Type: Vendor Advisory 24856 Source: GENTOO Type: UNKNOWN GLSA-200704-07 Source: CCN Type: SECTRACK ID: 1017789 libwpd Buffer Overflows Let Remote Users Execute Arbitrary Code Source: CCN Type: SourceForge.net: Files WordPerfect Document importer/exporter - File Release Notes and Changelog - Release Name: libwpd-0.8.9 Source: CONFIRM Type: UNKNOWN http://sourceforge.net/project/shownotes.php?release_id=494122 Source: CCN Type: libwpd Web site SourceForge.net: WordPerfect Document importer/exporter Source: SUNALERT Type: UNKNOWN 102863 Source: CCN Type: ASA-2007-284 OpenOffice.org security update (RHSA-2007-0033) Source: CCN Type: Abiword Web site AbiWord Source: DEBIAN Type: UNKNOWN DSA-1268 Source: CCN Type: GLSA-200704-07 libwpd: Multiple vulnerabilities Source: CCN Type: KWord Web site The KOffice Project - KWord Source: MANDRIVA Type: UNKNOWN MDKSA-2007:063 Source: MANDRIVA Type: UNKNOWN MDKSA-2007:064 Source: CCN Type: OpenOffice.org Web site OpenOffice.org: Home Source: REDHAT Type: Vendor Advisory RHSA-2007:0033 Source: REDHAT Type: Vendor Advisory RHSA-2007:0055 Source: BUGTRAQ Type: UNKNOWN 20070316 rPSA-2007-0057-1 libwpd Source: BID Type: Patch 23006 Source: CCN Type: BID-23006 LibWPD Library Multiple Buffer Overflow Vulnerabilities Source: SECTRACK Type: UNKNOWN 1017789 Source: UBUNTU Type: UNKNOWN USN-437-1 Source: VUPEN Type: Vendor Advisory ADV-2007-0976 Source: XF Type: UNKNOWN libwpd-wp6general-integer-overflow(33110) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 03.16.07 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10862 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |