First published: Wed Jun 09 2010(Updated: )
Multiple directory traversal vulnerabilities in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to overwrite arbitrary files via a .. (dot dot) in an entry in (1) an XSLT JAR filter description file, (2) an Extension (aka OXT) file, or unspecified other (3) JAR or (4) ZIP files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | >=2.0.0<3.3.0 | |
Debian Linux | =5.0 | |
Ubuntu | =10.10 | |
Debian Linux | =6.0 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-3450 is classified as moderate, as it allows remote attackers to overwrite arbitrary files.
To fix CVE-2010-3450, upgrade to OpenOffice.org version 3.3 or later, which addresses these vulnerabilities.
CVE-2010-3450 affects OpenOffice.org versions 2.x and 3.x prior to version 3.3.
CVE-2010-3450 allows exploitation through multiple file types, including XSLT JAR filter description files, OXT files, and other JAR or ZIP files.
CVE-2010-3450 can lead to unauthorized data manipulation by allowing attackers to overwrite files on the user's system.