National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2006-5870 Detail

Current Description

Multiple integer overflows in OpenOffice.org (OOo) 2.0.4 and earlier, and possibly other versions before 2.1.0; and StarOffice 6 through 8; allow user-assisted remote attackers to execute arbitrary code via a crafted (a) WMF or (b) EMF file that triggers heap-based buffer overflows in (1) wmf/winwmf.cxx, during processing of META_ESCAPE records; and wmf/enhwmf.cxx, during processing of (2) EMR_POLYPOLYGON and (3) EMR_POLYPOLYGON16 records.

Source:  MITRE      Last Modified:  12/31/2006      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2006-5870
Original release date:
12/31/2006
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
9.3 HIGH
Vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Provides administrator access, Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (03/14/2007)

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc External Source SGI 20070101-01-P
http://archives.neohapsis.com/archives/vulnwatch/2007-q1/0002.htmly External Source VULNWATCH 20070104 High Risk Vulnerability in the OpenOffice and StarOffice Suites
http://fedoranews.org/cms/node/2344 External Source FEDORA FEDORA-2007-005
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0001.html External Source SUSE SUSE-SA:2007:001
http://security.gentoo.org/glsa/glsa-200701-07.xml External Source GENTOO GLSA-200701-07
http://securitytracker.com/id?1017466 External Source SECTRACK 1017466
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102735-1 External Source SUNALERT 102735
http://www.debian.org/security/2007/dsa-1246 External Source DEBIAN DSA-1246
http://www.kb.cert.org/vuls/id/220288 US Government Resource External Source CERT-VN VU#220288
http://www.mandriva.com/security/advisories?name=MDKSA-2007:006 External Source MANDRIVA MDKSA-2007:006
http://www.ngssoftware.com/advisories/high-risk-vulnerabilities-in-the-staroffice-suite/ External Source MISC http://www.ngssoftware.com/advisories/high-risk-vulnerabilities-in-the-staroffice-suite/
http://www.openoffice.org/issues/show_bug.cgi?id=70042 Patch External Source CONFIRM http://www.openoffice.org/issues/show_bug.cgi?id=70042
http://www.openoffice.org/nonav/issues/showattachment.cgi/39509/alloc.overflows.wmf.patch External Source CONFIRM http://www.openoffice.org/nonav/issues/showattachment.cgi/39509/alloc.overflows.wmf.patch
http://www.redhat.com/support/errata/RHSA-2007-0001.html Patch; Vendor Advisory External Source REDHAT RHSA-2007:0001
http://www.securityfocus.com/archive/1/455947/100/0/threaded External Source BUGTRAQ 20070104 Re: [VulnWatch] High Risk Vulnerability in the OpenOffice and StarOffice Suites
http://www.securityfocus.com/archive/1/455954/100/0/threaded External Source BUGTRAQ 20070104 Re: [VulnWatch] High Risk Vulnerability in the OpenOffice and StarOffice Suites
http://www.securityfocus.com/archive/1/archive/1/455943/100/0/threaded External Source BUGTRAQ 20070104 Correction (High Risk Vulnerability in the OpenOffice and StarOffice Suites)
http://www.securityfocus.com/archive/1/archive/1/455964/100/0/threaded External Source BUGTRAQ 20070104 High Risk Vulnerability in the OpenOffice and StarOffice Suites
http://www.securityfocus.com/archive/1/archive/1/456271/100/100/threaded External Source BUGTRAQ 20070108 rPSA-2007-0001-1 openoffice.org
http://www.ubuntu.com/usn/usn-406-1 External Source UBUNTU USN-406-1
http://www.vupen.com/english/advisories/2007/0031 Vendor Advisory External Source VUPEN ADV-2007-0031
http://www.vupen.com/english/advisories/2007/0059 Vendor Advisory External Source VUPEN ADV-2007-0059
https://exchange.xforce.ibmcloud.com/vulnerabilities/31257 External Source XF openoffice-wmf-bo(31257)
https://issues.rpath.com/browse/RPL-905 External Source CONFIRM https://issues.rpath.com/browse/RPL-905
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8280 External Source OVAL oval:org.mitre.oval:def:8280
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9145 External Source OVAL oval:org.mitre.oval:def:9145

References to Check Content

Identifier:
oval:org.mitre.oval:def:8280
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:8280
Identifier:
oval:org.mitre.oval:def:9145
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9145

Technical Details

Vulnerability Type (View All)

Change History 4 change records found - show changes