CVE-2008-2237
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
30/10/2008
Last modified:
09/04/2025
Description
Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:* | 2.4.1 (including) | |
| cpe:2.3:a:openoffice:openoffice.org:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:64-bit:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
- http://neowiki.neooffice.org/index.php/NeoOffice_2.2.5_Patch_3_New_Features#Security_fixes
- http://secunia.com/advisories/32419
- http://secunia.com/advisories/32461
- http://secunia.com/advisories/32463
- http://secunia.com/advisories/32489
- http://secunia.com/advisories/32676
- http://secunia.com/advisories/32856
- http://secunia.com/advisories/32872
- http://secunia.com/advisories/33140
- http://security.gentoo.org/glsa/glsa-200812-13.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-242627-1
- http://www.debian.org/security/2008/dsa-1661
- http://www.openoffice.org/security/cves/CVE-2008-2237.html
- http://www.redhat.com/support/errata/RHSA-2008-0939.html
- http://www.securityfocus.com/bid/31962
- http://www.securitytracker.com/id?1021120=
- http://www.ubuntu.com/usn/usn-677-1
- http://www.ubuntu.com/usn/usn-677-2
- http://www.vupen.com/english/advisories/2008/2947
- http://www.vupen.com/english/advisories/2008/3103
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46165
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10784
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00905.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00923.html
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
- http://neowiki.neooffice.org/index.php/NeoOffice_2.2.5_Patch_3_New_Features#Security_fixes
- http://secunia.com/advisories/32419
- http://secunia.com/advisories/32461
- http://secunia.com/advisories/32463
- http://secunia.com/advisories/32489
- http://secunia.com/advisories/32676
- http://secunia.com/advisories/32856
- http://secunia.com/advisories/32872
- http://secunia.com/advisories/33140
- http://security.gentoo.org/glsa/glsa-200812-13.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-242627-1
- http://www.debian.org/security/2008/dsa-1661
- http://www.openoffice.org/security/cves/CVE-2008-2237.html
- http://www.redhat.com/support/errata/RHSA-2008-0939.html
- http://www.securityfocus.com/bid/31962
- http://www.securitytracker.com/id?1021120=
- http://www.ubuntu.com/usn/usn-677-1
- http://www.ubuntu.com/usn/usn-677-2
- http://www.vupen.com/english/advisories/2008/2947
- http://www.vupen.com/english/advisories/2008/3103
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46165
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10784
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00905.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00923.html



