Vulnerabilidad en OpenOffice.org (CVE-2010-0395)
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
10/06/2010
Última modificación:
11/04/2025
Descripción
OpenOffice.org v2.x y v3.0 anterior v3.2.1 permite a atacantes remotos asistidos por usuarios supera las restricciones macro de seguridad de Python y ejecutar código Python de su elección a través de un fichero de texto OpenDocument manipulado lo cual ocasiona la ejecución de código cuando la estructura directorio macro es previsualizada.
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:* | 2.0.0 (incluyendo) | 3.2.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://secunia.com/advisories/40070
- http://secunia.com/advisories/40084
- http://secunia.com/advisories/40104
- http://secunia.com/advisories/40107
- http://secunia.com/advisories/41818
- http://secunia.com/advisories/60799
- http://ubuntu.com/usn/usn-949-1
- http://www.debian.org/security/2010/dsa-2055
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A221
- http://www.openoffice.org/security/cves/CVE-2010-0395.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.redhat.com/support/errata/RHSA-2010-0459.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
- http://www.vupen.com/english/advisories/2010/1350
- http://www.vupen.com/english/advisories/2010/1353
- http://www.vupen.com/english/advisories/2010/1366
- http://www.vupen.com/english/advisories/2010/1369
- http://www.vupen.com/english/advisories/2010/2905
- https://bugzilla.redhat.com/show_bug.cgi?id=574119
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://secunia.com/advisories/40070
- http://secunia.com/advisories/40084
- http://secunia.com/advisories/40104
- http://secunia.com/advisories/40107
- http://secunia.com/advisories/41818
- http://secunia.com/advisories/60799
- http://ubuntu.com/usn/usn-949-1
- http://www.debian.org/security/2010/dsa-2055
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A221
- http://www.openoffice.org/security/cves/CVE-2010-0395.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.redhat.com/support/errata/RHSA-2010-0459.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
- http://www.vupen.com/english/advisories/2010/1350
- http://www.vupen.com/english/advisories/2010/1353
- http://www.vupen.com/english/advisories/2010/1366
- http://www.vupen.com/english/advisories/2010/1369
- http://www.vupen.com/english/advisories/2010/2905
- https://bugzilla.redhat.com/show_bug.cgi?id=574119
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091



