CVE-2007-0239
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
21/03/2007
Última modificación:
09/04/2025
Descripción
OpenOffice.org (OOo) Office Suite permite a atacantes con la intervención del usuario ejecutar comandos de su elección mediante la inserción de metacaracteres de shell en un enlace preparado dentro de un documento manipulado.
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:openoffice:openoffice:*:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0007.html
- http://secunia.com/advisories/24465
- http://secunia.com/advisories/24550
- http://secunia.com/advisories/24588
- http://secunia.com/advisories/24613
- http://secunia.com/advisories/24646
- http://secunia.com/advisories/24647
- http://secunia.com/advisories/24676
- http://secunia.com/advisories/24810
- http://secunia.com/advisories/24906
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102807-1
- http://www.debian.org/security/2007/dsa-1270
- http://www.gentoo.org/security/en/glsa/glsa-200704-12.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A073
- http://www.redhat.com/support/errata/RHSA-2007-0033.html
- http://www.redhat.com/support/errata/RHSA-2007-0069.html
- http://www.securityfocus.com/bid/22812
- http://www.securitytracker.com/id?1017799=
- http://www.ubuntu.com/usn/usn-444-1
- http://www.vupen.com/english/advisories/2007/1032
- http://www.vupen.com/english/advisories/2007/1117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33113
- https://issues.foresightlinux.org/browse/FL-211
- https://issues.rpath.com/browse/RPL-1118
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11422
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0007.html
- http://secunia.com/advisories/24465
- http://secunia.com/advisories/24550
- http://secunia.com/advisories/24588
- http://secunia.com/advisories/24613
- http://secunia.com/advisories/24646
- http://secunia.com/advisories/24647
- http://secunia.com/advisories/24676
- http://secunia.com/advisories/24810
- http://secunia.com/advisories/24906
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102807-1
- http://www.debian.org/security/2007/dsa-1270
- http://www.gentoo.org/security/en/glsa/glsa-200704-12.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A073
- http://www.redhat.com/support/errata/RHSA-2007-0033.html
- http://www.redhat.com/support/errata/RHSA-2007-0069.html
- http://www.securityfocus.com/bid/22812
- http://www.securitytracker.com/id?1017799=
- http://www.ubuntu.com/usn/usn-444-1
- http://www.vupen.com/english/advisories/2007/1032
- http://www.vupen.com/english/advisories/2007/1117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33113
- https://issues.foresightlinux.org/browse/FL-211
- https://issues.rpath.com/browse/RPL-1118
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11422