CVE-2009-3302
🔴 Łataj teraz
Błąd w OpenOffice.org umożliwia zdalnym atakującym wywołanie awarii aplikacji lub wykonanie kodu.
CVSS
9.3
EPSS
42.8%
Exploit
none
Vendor
canonical
Opis źródłowy (NVD)
filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTSetBrc table property modifier in a Word document, related to a "boundary error flaw."
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 42.8% |
| Opublikowano (NVD) | 2010-02-16 19:30:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 01:13:23 UTC |
Referencje
- http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html (cve@mitre.org) [Third Party Advisory]
- http://secunia.com/advisories/38567 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/38568 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/38695 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/38921 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/41818 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/60799 (cve@mitre.org) [Broken Link]
- http://securitytracker.com/id?1023591 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.debian.org/security/2010/dsa-1995 (cve@mitre.org) [Third Party Advisory]
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml (cve@mitre.org) [Third Party Advisory]
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:221 (cve@mitre.org) [Broken Link]
- http://www.openoffice.org/security/bulletin.html (cve@mitre.org) [Vendor Advisory]
- http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html (cve@mitre.org) [Vendor Advisory]
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html (cve@mitre.org) [Third Party Advisory]
- http://www.redhat.com/support/errata/RHSA-2010-0101.html (cve@mitre.org) [Broken Link]
- http://www.securityfocus.com/bid/38218 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.ubuntu.com/usn/USN-903-1 (cve@mitre.org) [Third Party Advisory]
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html (cve@mitre.org) [Third Party Advisory, US Government Resource]
- http://www.vupen.com/english/advisories/2010/0366 (cve@mitre.org) [Broken Link]
- http://www.vupen.com/english/advisories/2010/0635 (cve@mitre.org) [Broken Link]
- http://www.vupen.com/english/advisories/2010/2905 (cve@mitre.org) [Broken Link]
- https://bugzilla.redhat.com/show_bug.cgi?id=533043 (cve@mitre.org) [Issue Tracking, Third Party Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56241 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10022 (cve@mitre.org) [Tool Signature]