CVE-2009-2139
Published Sep 8, 2009
Last updated 14 years ago
Overview
- Description
- Heap-based buffer overflow in svtools/source/filter.vcl/wmf/enhwmf.cxx in Go-oo 2.x and 3.x before 3.0.1, previously named ooo-build and related to OpenOffice.org (OOo), allows remote attackers to execute arbitrary code via a crafted EMF file, a similar issue to CVE-2008-2238.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of openoffice.org and openoffice.org2 packages as shipped with Red Hat Enterprise Linux 3, 4, or 5.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:openoffice.org:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4F46C7F-E645-4F87-B897-431039A17BE5" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2693A016-B0D3-4B14-9EAF-D79623931CF4" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB2CB19D-E988-4757-A06C-C10FA529822B" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A76AAD8-2ACB-44C4-895A-FBA85058FC02" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71982BDE-67C3-4BEF-B878-CD5701F48983" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "229AB3A5-5ED7-4B43-9116-E432BC139481" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECD5BBAD-8555-4C89-9168-4DB54636D13A" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2EA0695-7A9E-44C4-AF0C-070F4B974989" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4E3D4EA-25F3-4EB9-A1E4-AD10315B6CDC" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A78642E4-BBF6-4593-9666-42ED2145107E" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BA9E3C2-AF95-48D4-9329-7D0C424DCC1E" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F711CC8-3DD6-479B-AC6A-1AB3D90DE1CE" }, { "criteria": "cpe:2.3:a:sun:openoffice.org:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64366513-9A88-4D89-BB29-5B91781AA51C" } ], "operator": "OR" } ] } ]