ID CVE-2007-1466
Summary Integer overflow in the WP6GeneralTextPacket::_readContents function in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file, a different vulnerability than CVE-2007-0002.
References
Vulnerable Configurations
  • cpe:2.3:a:sourceforge:wordperfect_document_importer-exporter:0.8.8
    cpe:2.3:a:sourceforge:wordperfect_document_importer-exporter:0.8.8
CVSS
Base: 6.8 (as of 19-03-2007 - 08:20)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200704-07.NASL
    description The remote host is affected by the vulnerability described in GLSA-200704-07 (libwpd: Multiple vulnerabilities) libwpd contains heap-based overflows in two functions that convert WordPerfect document tables. In addition, it contains an integer overflow in a text-conversion function. Impact : An attacker could entice a user to convert a specially crafted WordPerfect file, resulting in a crash or possibly the execution of arbitrary code with the rights of the user running libwpd. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2016-11-11
    plugin id 25020
    published 2007-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25020
    title GLSA-200704-07 : libwpd: Multiple vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2007-0033.NASL
    description Updated openoffice.org packages to correct security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite that includes desktop applications such as a word processor, spreadsheet, presentation manager, formula editor, and drawing program. iDefense reported an integer overflow flaw in libwpd, a library used internally to OpenOffice.org for handling Word Perfect documents. An attacker could create a carefully crafted Word Perfect file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-1466) John Heasman discovered a stack overflow in the StarCalc parser in OpenOffice.org. An attacker could create a carefully crafted StarCalc file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-0238) Flaws were discovered in the way OpenOffice.org handled hyperlinks. An attacker could create an OpenOffice.org document which could run commands if a victim opened the file and clicked on a malicious hyperlink. (CVE-2007-0239) All users of OpenOffice.org are advised to upgrade to these updated packages, which contain backported fixes for these issues. Red Hat would like to thank Fridrich Strba for alerting us to the issue CVE-2007-1466 and providing a patch, and John Heasman for CVE-2007-0238.
    last seen 2019-02-21
    modified 2018-11-16
    plugin id 24896
    published 2007-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24896
    title RHEL 3 / 4 : openoffice.org (RHSA-2007:0033)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_120190.NASL
    description StarSuite 8 (Solaris_x86): Update 14. Date this patch was last updated by Sun : Sep/11/09
    last seen 2018-09-01
    modified 2018-08-22
    plugin id 22994
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22994
    title Solaris 5.10 (x86) : 120190-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_120185-23.NASL
    description StarOffice 8 (Solaris): Update 18. Date this patch was last updated by Sun : Mar/15/11
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107355
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107355
    title Solaris 10 (sparc) : 120185-23
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS9_120189.NASL
    description StarSuite 8 (Solaris): Update 14. Date this patch was last updated by Sun : Sep/09/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23558
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23558
    title Solaris 5.9 (sparc) : 120189-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS8_X86_120186.NASL
    description StarOffice 8 (Solaris_x86): Update 14. Date this patch was last updated by Sun : Sep/10/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23467
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23467
    title Solaris 5.8 (x86) : 120186-19
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2007-0055.NASL
    description Updated libwpd packages to correct a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. libwpd is a library for reading and converting Word Perfect documents. iDefense reported several overflow bugs in libwpd. An attacker could create a carefully crafted Word Perfect file that could cause an application linked with libwpd, such as OpenOffice, to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-0002) All users are advised to upgrade to these updated packages, which contain a backported fix for this issue. Red Hat would like to thank Fridrich Strba for alerting us to these issues and providing a patch.
    last seen 2019-02-21
    modified 2018-11-16
    plugin id 25312
    published 2007-05-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25312
    title RHEL 5 : libwpd (RHSA-2007:0055)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2007-064.NASL
    description iDefense reported several overflow bugs in libwpd. An attacker could create a carefully crafted Word Perfect file that could cause an application linked with libwpd, such as OpenOffice, to crash or possibly execute arbitrary code if the file was opened by a victim. OpenOffice.org-2.X contains an embedded copy of libpwd, and as such is susceptible to the same issues. Updated packages have been rebuilt using the system libwpd to address this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 24843
    published 2007-03-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24843
    title Mandrake Linux Security Advisory : openoffice.org (MDKSA-2007:064)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2007-0033.NASL
    description From Red Hat Security Advisory 2007:0033 : Updated openoffice.org packages to correct security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite that includes desktop applications such as a word processor, spreadsheet, presentation manager, formula editor, and drawing program. iDefense reported an integer overflow flaw in libwpd, a library used internally to OpenOffice.org for handling Word Perfect documents. An attacker could create a carefully crafted Word Perfect file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-1466) John Heasman discovered a stack overflow in the StarCalc parser in OpenOffice.org. An attacker could create a carefully crafted StarCalc file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-0238) Flaws were discovered in the way OpenOffice.org handled hyperlinks. An attacker could create an OpenOffice.org document which could run commands if a victim opened the file and clicked on a malicious hyperlink. (CVE-2007-0239) All users of OpenOffice.org are advised to upgrade to these updated packages, which contain backported fixes for these issues. Red Hat would like to thank Fridrich Strba for alerting us to the issue CVE-2007-1466 and providing a patch, and John Heasman for CVE-2007-0238.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 67443
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67443
    title Oracle Linux 3 / 4 : openoffice.org (ELSA-2007-0033)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-437-1.NASL
    description Sean Larsson of iDefense Labs discovered that libwpd was vulnerable to integer overflows. If a user were tricked into opening a specially crafted WordPerfect document with an application that used libwpd, an attacker could execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 28033
    published 2007-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28033
    title Ubuntu 5.10 / 6.06 LTS / 6.10 : libwpd vulnerability (USN-437-1)
  • NASL family Windows
    NASL id OPENOFFICE_220.NASL
    description The remote host is running a version of Sun Microsystems OpenOffice.org that is prior to version 2.2. It is, therefore, affected by a stack-based buffer overflow vulnerability in its handling of StarCalc documents. If a remote attacker can trick a user into opening a specially crafted StarCalc document, the attacker can execute arbitrary code on the remote host subject to the user's privileges. In addition, versions 2.0 - 2.1 reportedly have a heap-based buffer overflow vulnerability that can be triggered when importing a specially crafted WordPerfect document, resulting in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 25004
    published 2007-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25004
    title Sun OpenOffice.org < 2.2 Multiple Vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2007-0033.NASL
    description Updated openoffice.org packages to correct security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite that includes desktop applications such as a word processor, spreadsheet, presentation manager, formula editor, and drawing program. iDefense reported an integer overflow flaw in libwpd, a library used internally to OpenOffice.org for handling Word Perfect documents. An attacker could create a carefully crafted Word Perfect file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-1466) John Heasman discovered a stack overflow in the StarCalc parser in OpenOffice.org. An attacker could create a carefully crafted StarCalc file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-0238) Flaws were discovered in the way OpenOffice.org handled hyperlinks. An attacker could create an OpenOffice.org document which could run commands if a victim opened the file and clicked on a malicious hyperlink. (CVE-2007-0239) All users of OpenOffice.org are advised to upgrade to these updated packages, which contain backported fixes for these issues. Red Hat would like to thank Fridrich Strba for alerting us to the issue CVE-2007-1466 and providing a patch, and John Heasman for CVE-2007-0238.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 24877
    published 2007-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24877
    title CentOS 3 / 4 : openoffice.org (CESA-2007:0033)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2007-063.NASL
    description iDefense reported several overflow bugs in libwpd. An attacker could create a carefully crafted Word Perfect file that could cause an application linked with libwpd, such as OpenOffice, to crash or possibly execute arbitrary code if the file was opened by a victim. Updated packages have been patched to address this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 24842
    published 2007-03-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24842
    title Mandrake Linux Security Advisory : libwpd (MDKSA-2007:063)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2007-350.NASL
    description CVE-2007-0002 buffer overflows in wordperfect document parsing Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-12-08
    plugin id 24884
    published 2007-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24884
    title Fedora Core 5 : libwpd-0.8.9-1.fc5 (2007-350)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_120189.NASL
    description StarSuite 8 (Solaris): Update 14. Date this patch was last updated by Sun : Sep/09/09
    last seen 2018-09-02
    modified 2018-08-22
    plugin id 22961
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22961
    title Solaris 5.10 (sparc) : 120189-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS8_120185.NASL
    description StarOffice 8 (Solaris): Update 14. Date this patch was last updated by Sun : Sep/09/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23419
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23419
    title Solaris 5.8 (sparc) : 120185-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_120186-23.NASL
    description StarOffice 8 (Solaris_x86): Update 18. Date this patch was last updated by Sun : Mar/15/11
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107857
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107857
    title Solaris 10 (x86) : 120186-23
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_120190-23.NASL
    description StarSuite 8 (Solaris_x86): Update 18. Date this patch was last updated by Sun : Mar/15/11
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107858
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107858
    title Solaris 10 (x86) : 120190-23
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1268.NASL
    description iDefense reported several integer overflow bugs in libwpd, a library for handling WordPerfect documents. Attackers were able to exploit these with carefully crafted Word Perfect files that could cause an application linked with libwpd to crash or possibly execute arbitrary code.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 24835
    published 2007-03-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24835
    title Debian DSA-1268-1 : libwpd - integer overflow
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_120186.NASL
    description StarOffice 8 (Solaris_x86): Update 14. Date this patch was last updated by Sun : Sep/10/09
    last seen 2018-09-01
    modified 2018-08-22
    plugin id 22993
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22993
    title Solaris 5.10 (x86) : 120186-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_120189-23.NASL
    description StarSuite 8 (Solaris): Update 18. Date this patch was last updated by Sun : Mar/15/11
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107356
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107356
    title Solaris 10 (sparc) : 120189-23
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS9_X86_120190.NASL
    description StarSuite 8 (Solaris_x86): Update 14. Date this patch was last updated by Sun : Sep/11/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23617
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23617
    title Solaris 5.9 (x86) : 120190-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_120185.NASL
    description StarOffice 8 (Solaris): Update 14. Date this patch was last updated by Sun : Sep/09/09
    last seen 2018-09-02
    modified 2018-08-22
    plugin id 22960
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22960
    title Solaris 5.10 (sparc) : 120185-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS8_X86_120190.NASL
    description StarSuite 8 (Solaris_x86): Update 14. Date this patch was last updated by Sun : Sep/11/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23468
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23468
    title Solaris 5.8 (x86) : 120190-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS8_120189.NASL
    description StarSuite 8 (Solaris): Update 14. Date this patch was last updated by Sun : Sep/09/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23420
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23420
    title Solaris 5.8 (sparc) : 120189-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS9_120185.NASL
    description StarOffice 8 (Solaris): Update 14. Date this patch was last updated by Sun : Sep/09/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23557
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23557
    title Solaris 5.9 (sparc) : 120185-19
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS9_X86_120186.NASL
    description StarOffice 8 (Solaris_x86): Update 14. Date this patch was last updated by Sun : Sep/10/09
    last seen 2016-09-26
    modified 2011-09-18
    plugin id 23616
    published 2006-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23616
    title Solaris 5.9 (x86) : 120186-19
oval via4
accepted 2013-04-29T04:09:27.650-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Integer overflow in the WP6GeneralTextPacket::_readContents function in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file, a different vulnerability than CVE-2007-0002.
family unix
id oval:org.mitre.oval:def:10862
status accepted
submitted 2010-07-09T03:56:16-04:00
title Integer overflow in the WP6GeneralTextPacket::_readContents function in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file, a different vulnerability than CVE-2007-0002.
version 25
redhat via4
advisories
  • bugzilla
    id 228008
    title CVE-2007-0239 hyperlink escaping issue
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 3 is installed
        oval oval:com.redhat.rhba:tst:20070026001
      • OR
        • AND
          • comment openoffice.org is earlier than 0:1.1.2-38.2.0.EL3
            oval oval:com.redhat.rhsa:tst:20070033002
          • comment openoffice.org is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001003
        • AND
          • comment openoffice.org-i18n is earlier than 0:1.1.2-38.2.0.EL3
            oval oval:com.redhat.rhsa:tst:20070033006
          • comment openoffice.org-i18n is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001007
        • AND
          • comment openoffice.org-libs is earlier than 0:1.1.2-38.2.0.EL3
            oval oval:com.redhat.rhsa:tst:20070033004
          • comment openoffice.org-libs is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001005
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304001
      • OR
        • AND
          • comment openoffice.org is earlier than 0:1.1.5-10.6.0.EL4
            oval oval:com.redhat.rhsa:tst:20070033009
          • comment openoffice.org is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001003
        • AND
          • comment openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.EL4
            oval oval:com.redhat.rhsa:tst:20070033013
          • comment openoffice.org-i18n is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001007
        • AND
          • comment openoffice.org-kde is earlier than 0:1.1.5-10.6.0.EL4
            oval oval:com.redhat.rhsa:tst:20070033011
          • comment openoffice.org-kde is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001012
        • AND
          • comment openoffice.org-libs is earlier than 0:1.1.5-10.6.0.EL4
            oval oval:com.redhat.rhsa:tst:20070033010
          • comment openoffice.org-libs is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070001005
    rhsa
    id RHSA-2007:0033
    released 2007-03-22
    severity Important
    title RHSA-2007:0033: openoffice.org security update (Important)
  • bugzilla
    id 222808
    title CVE-2007-0002 buffer overflows
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment libwpd is earlier than 0:0.8.7-3.el5
          oval oval:com.redhat.rhsa:tst:20070055002
        • comment libwpd is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070055003
      • AND
        • comment libwpd-devel is earlier than 0:0.8.7-3.el5
          oval oval:com.redhat.rhsa:tst:20070055004
        • comment libwpd-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070055005
      • AND
        • comment libwpd-tools is earlier than 0:0.8.7-3.el5
          oval oval:com.redhat.rhsa:tst:20070055006
        • comment libwpd-tools is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070055007
    rhsa
    id RHSA-2007:0055
    released 2007-03-16
    severity Important
    title RHSA-2007:0055: libwpd security update (Important)
rpms
  • openoffice.org-0:1.1.2-38.2.0.EL3
  • openoffice.org-i18n-0:1.1.2-38.2.0.EL3
  • openoffice.org-libs-0:1.1.2-38.2.0.EL3
  • openoffice.org-0:1.1.5-10.6.0.EL4
  • openoffice.org-i18n-0:1.1.5-10.6.0.EL4
  • openoffice.org-kde-0:1.1.5-10.6.0.EL4
  • openoffice.org-libs-0:1.1.5-10.6.0.EL4
  • libwpd-0:0.8.7-3.el5
  • libwpd-devel-0:0.8.7-3.el5
  • libwpd-tools-0:0.8.7-3.el5
refmap via4
bid 23006
bugtraq 20070316 rPSA-2007-0057-1 libwpd
confirm http://sourceforge.net/project/shownotes.php?release_id=494122
debian DSA-1268
fedora FEDORA-2007-350
gentoo GLSA-200704-07
idefense 20070316 Multiple Vendor libwpd Multiple Buffer Overflow Vulnerabilities
mandriva
  • MDKSA-2007:063
  • MDKSA-2007:064
sectrack 1017789
secunia
  • 24507
  • 24550
  • 24557
  • 24572
  • 24573
  • 24580
  • 24581
  • 24588
  • 24794
  • 24856
sunalert 102863
ubuntu USN-437-1
vupen ADV-2007-0976
Last major update 11-10-2011 - 00:00
Published 16-03-2007 - 17:19
Last modified 16-10-2018 - 12:38
Back to Top