Vulnerability Name: | CVE-2007-5745 (CCN-41863) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2007-10-31 | ||||||||||||||||||||||||||||||||||||
Published: | 2008-04-17 | ||||||||||||||||||||||||||||||||||||
Updated: | 2017-09-29 | ||||||||||||||||||||||||||||||||||||
Summary: | Multiple heap-based buffer overflows in OpenOffice.org before 2.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted (1) Attribute and (2) Font Description records. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-5745 Source: CCN Type: OpenOffice.org Web site download: OpenOffice.org Downloads Source: IDEFENSE Type: UNKNOWN 20080417 Multiple Vendor OpenOffice QPRO Multiple Heap Overflow Vulnerabilities Source: CCN Type: RHSA-2008-0175 Important: openoffice.org security update Source: CCN Type: SA29852 OpenOffice Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 29852 Source: SECUNIA Type: Patch, Vendor Advisory 29864 Source: SECUNIA Type: Vendor Advisory 29871 Source: SECUNIA Type: Vendor Advisory 29910 Source: SECUNIA Type: Vendor Advisory 29913 Source: CCN Type: SA29987 Sun StarOffice/StarSuite Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 29987 Source: SECUNIA Type: Vendor Advisory 30100 Source: SECUNIA Type: Vendor Advisory 30179 Source: GENTOO Type: UNKNOWN GLSA-200805-16 Source: CCN Type: SECTRACK ID: 1019891 OpenOffice Heap Overflow in Processing Quattro Pro Files Lets Remote Users Execute Arbitrary Code Source: SUNALERT Type: UNKNOWN 231601 Source: CCN Type: Sun Alert ID: 231601 Security Vulnerability With Quattro Pro Files in StarOffice 8/StarSuite 8 Source: CCN Type: ASA-2008-171 openoffice.org2 security update (RHSA-2008-0175) Source: DEBIAN Type: Patch DSA-1547 Source: DEBIAN Type: DSA-1547 openoffice.org -- several vulnerabilities Source: MANDRIVA Type: UNKNOWN MDVSA-2008:095 Source: SUSE Type: UNKNOWN SUSE-SA:2008:023 Source: CONFIRM Type: Patch http://www.openoffice.org/security/bulletin.html Source: CONFIRM Type: UNKNOWN http://www.openoffice.org/security/cves/CVE-2007-4770.html Source: CCN Type: OpenOffice.org Security Bulletin CVE-2007-5745/5747 Manipulated Quattro Pro files can lead to heap overflows and arbitrary code execution Source: CONFIRM Type: Patch http://www.openoffice.org/security/cves/CVE-2007-5745.html Source: REDHAT Type: UNKNOWN RHSA-2008:0175 Source: BID Type: UNKNOWN 28819 Source: CCN Type: BID-28819 OpenOffice Multiple Heap Based Buffer Overflow Vulnerabilities Source: SECTRACK Type: UNKNOWN 1019891 Source: CCN Type: USN-609-1 OpenOffice.org vulnerabilities Source: UBUNTU Type: UNKNOWN USN-609-1 Source: VUPEN Type: Vendor Advisory ADV-2008-1253 Source: VUPEN Type: Vendor Advisory ADV-2008-1375 Source: MISC Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=435678 Source: XF Type: UNKNOWN openoffice-quattropro-bo(41863) Source: XF Type: UNKNOWN openoffice-quattropro-bo(41863) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 04.17.08 Multiple Vendor OpenOffice QPRO Multiple Heap Overflow Vulnerabilities Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11006 Source: FEDORA Type: UNKNOWN FEDORA-2008-3251 Source: SUSE Type: SUSE-SA:2008:023 OpenOffice.org security problems | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |