CVE-2008-3437
Published Aug 1, 2008
Last updated 16 years ago
Overview
- Description
- OpenOffice.org (OOo) before 2.1.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of OpenOffice.org as shipped with Red Hat Enterprise Linux 3, 4, or 5. The updated Red Hat Enterprise Linux packages are not distributed via the openoffice.org update service, but rather via Red Hat Network, using the package manager capabilities to verify authenticity of updates.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openoffice:openoffice.org:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E697B8A3-447B-4D7B-A02B-191119453CCB" }, { "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45DD57AC-8CA4-48DB-90F9-2D7260AB7650" }, { "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C065AAB-58E3-4312-AD74-A3E103AC73DB" }, { "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9487A325-308D-442A-89A9-E8650925F43F" }, { "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4B493F3-833A-47E9-AB60-BE2D635EF8AC" } ], "operator": "OR" } ] } ]