Vulnerability Details : CVE-2007-0245
Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-0245
- cpe:2.3:a:openoffice:openoffice:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-0245
9.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-0245
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-0245
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-0245
-
http://secunia.com/advisories/25650
Vendor Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102917-1
-
http://www.redhat.com/support/errata/RHSA-2007-0406.html
-
http://www.vupen.com/english/advisories/2007/2166
Vendor Advisory
-
http://www.vupen.com/english/advisories/2007/2229
Site en constructionVendor Advisory
-
http://www.securityfocus.com/bid/24450
-
http://www.ubuntu.com/usn/usn-482-1
-
http://secunia.com/advisories/26010
Vendor Advisory
-
http://www.securitytracker.com/id?1018239
-
http://sw.openoffice.org/source/browse/sw/sw/source/filter/rtf/swparrtf.cxx?rev=1.67
-
http://www.debian.org/security/2007/dsa-1307
Patch
-
http://secunia.com/advisories/25648
Vendor Advisory
-
http://secunia.com/advisories/26022
Vendor Advisory
-
http://osvdb.org/35378
-
http://secunia.com/advisories/25705
About Secunia Research | FlexeraVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34843
-
http://secunia.com/advisories/26476
Vendor Advisory
-
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
-
https://issues.rpath.com/browse/RPL-1570
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10002
-
http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
OpenOffice.org: Two buffer overflows (GLSA 200707-02) — Gentoo security
-
http://secunia.com/advisories/25673
Vendor Advisory
-
http://secunia.com/advisories/25905
About Secunia Research | FlexeraVendor Advisory
-
http://www.securityfocus.com/archive/1/471274/100/0/threaded
-
http://www.novell.com/linux/security/advisories/2007_37_openoffice.html
-
http://secunia.com/advisories/25894
About Secunia Research | FlexeraVendor Advisory
-
http://secunia.com/advisories/25862
Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:144
Jump to