First published: Fri Jun 30 2006(Updated: )
Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | =1.1.0 | |
Apache OpenOffice | =1.1.1 | |
Apache OpenOffice | =1.1.2 | |
Apache OpenOffice | =1.1.3 | |
Apache OpenOffice | =1.1.4 | |
Apache OpenOffice | =2.0 | |
Apache OpenOffice | =2.0.0 | |
Apache OpenOffice | =2.0.1 | |
Apache OpenOffice | =2.0.2 | |
Apache OpenOffice | =6.0 | |
Apache OpenOffice | =7.0 | |
Apache OpenOffice | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3117 has a medium severity rating due to the potential for arbitrary code execution via crafted OpenOffice XML documents.
To fix CVE-2006-3117, users should upgrade their OpenOffice or StarOffice software to the latest version available.
CVE-2006-3117 affects OpenOffice.org versions 1.1.x up to 1.1.5 and 2.0.x before 2.0.3, as well as various Sun StarOffice versions.
CVE-2006-3117 impacts applications such as Calc, Draw, Impress, Math, and Writer in OpenOffice.org.
Attackers cannot exploit CVE-2006-3117 without user interaction, as they need to convince the user to open a malicious document.