Vulnerability Details : CVE-2006-4514
Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-4514
- cpe:2.3:a:libgsf:libgsf:1.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:libgsf:libgsf:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:libgsf:libgsf:1.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:libgsf:libgsf:1.14.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4514
2.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4514
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-4514
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2006-4514
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References for CVE-2006-4514
-
https://issues.rpath.com/browse/RPL-857
-
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
-
ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30611
libgsf ole_info_read_metabat() OLE file buffer overflow CVE-2006-4514 Vulnerability Report
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446
Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413
404 Not Found
-
http://www.debian.org/security/2006/dsa-1221
[SECURITY] [DSA 1221-1] New libgsf packages fix arbitrary code executionPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/21358
Patch
-
http://security.gentoo.org/glsa/glsa-200612-13.xml
libgsf: Buffer overflow (GLSA 200612-13) — Gentoo security
-
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html
Object not found!
-
http://www.ubuntu.com/usn/usn-391-1
USN-391-1: libgsf vulnerability | Ubuntu security notices | Ubuntu
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:220
Mandriva
-
http://rhn.redhat.com/errata/RHSA-2007-0011.html
RHSA-2007:0011 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
http://www.vupen.com/english/advisories/2006/4784
Site en constructionVendor Advisory
-
http://www.securityfocus.com/archive/1/454389/30/9210/threaded
Jump to