CVE-2006-3117

CVSS V2 High 7.6 CVSS V3 None
Description
Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."
Overview
  • CVE ID
  • CVE-2006-3117
  • Assigner
  • security@debian.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2006-06-30T18:05:00
  • Last Modified Date
  • 2018-10-18T16:45:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:openoffice:openoffice:1.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:1.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:1.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:1.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:1.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openoffice:openoffice:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sun:staroffice:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sun:staroffice:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sun:staroffice:8.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.6
  • Severity
  • HIGH
  • Exploitability Score
  • 4.9
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://www.ngssoftware.com/advisories/openoffice.txt Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1 Patch
http://www.openoffice.org/security/CVE-2006-3117.html Patch
http://www.debian.org/security/2006/dsa-1104
http://www.redhat.com/support/errata/RHSA-2006-0573.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_40_openoffice.html
http://www.securityfocus.com/bid/18739
http://securitytracker.com/id?1016414
http://secunia.com/advisories/20867 Vendor Advisory
http://secunia.com/advisories/20893 Vendor Advisory
http://secunia.com/advisories/20911 Vendor Advisory
http://www.ubuntu.com/usn/usn-313-1
http://secunia.com/advisories/20913 Vendor Advisory
http://secunia.com/advisories/20910 Vendor Advisory
http://secunia.com/advisories/20975 Vendor Advisory
http://secunia.com/advisories/20995 Vendor Advisory
http://www.ubuntu.com/usn/usn-313-2
http://security.gentoo.org/glsa/glsa-200607-12.xml
http://secunia.com/advisories/21278 Vendor Advisory
https://issues.rpath.com/browse/RPL-475
http://secunia.com/advisories/22129 Vendor Advisory
http://fedoranews.org/cms/node/2343
http://secunia.com/advisories/23620 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:118
http://www.vupen.com/english/advisories/2006/2621 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2607 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27571
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704
http://www.securityfocus.com/archive/1/447035/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:07:08 Added to TrackCVE