CVE-2010-0395
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/06/2010
Last modified:
11/04/2025
Description
OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:* | 2.0.0 (including) | 3.2.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://secunia.com/advisories/40070
- http://secunia.com/advisories/40084
- http://secunia.com/advisories/40104
- http://secunia.com/advisories/40107
- http://secunia.com/advisories/41818
- http://secunia.com/advisories/60799
- http://ubuntu.com/usn/usn-949-1
- http://www.debian.org/security/2010/dsa-2055
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A221
- http://www.openoffice.org/security/cves/CVE-2010-0395.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.redhat.com/support/errata/RHSA-2010-0459.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
- http://www.vupen.com/english/advisories/2010/1350
- http://www.vupen.com/english/advisories/2010/1353
- http://www.vupen.com/english/advisories/2010/1366
- http://www.vupen.com/english/advisories/2010/1369
- http://www.vupen.com/english/advisories/2010/2905
- https://bugzilla.redhat.com/show_bug.cgi?id=574119
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://secunia.com/advisories/40070
- http://secunia.com/advisories/40084
- http://secunia.com/advisories/40104
- http://secunia.com/advisories/40107
- http://secunia.com/advisories/41818
- http://secunia.com/advisories/60799
- http://ubuntu.com/usn/usn-949-1
- http://www.debian.org/security/2010/dsa-2055
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A221
- http://www.openoffice.org/security/cves/CVE-2010-0395.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.redhat.com/support/errata/RHSA-2010-0459.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
- http://www.vupen.com/english/advisories/2010/1350
- http://www.vupen.com/english/advisories/2010/1353
- http://www.vupen.com/english/advisories/2010/1366
- http://www.vupen.com/english/advisories/2010/1369
- http://www.vupen.com/english/advisories/2010/2905
- https://bugzilla.redhat.com/show_bug.cgi?id=574119
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091



