Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-02922

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 9.3
EPSS Низкий

Описание

Множественные уязвимости пакета libwpd-stream8c2a операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 9,3)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
s390x:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
m68k:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
i686:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
hppa:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
sparc:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
x86-64:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
alpha:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
ia64:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
mips:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
noarch:
libwpd8-doc - 0.8.7-6
mipsel:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
arm:
libwpd-stream8c2a - 0.8.7-6
libwpd-tools - 0.8.7-6
libwpd8-dev - 0.8.7-6
libwpd8c2a - 0.8.7-6
Debian GNU/Linux 3.1:
ppc:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
s390x:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
m68k:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
i686:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
hppa:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
sparc:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
x86-64:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
alpha:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
ia64:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
mips:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
noarch:
libwpd8-doc - 0.8.1-1sarge1
mipsel:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarge1
arm:
libwpd-stream8 - 0.8.1-1sarge1
libwpd-tools - 0.8.1-1sarge1
libwpd8 - 0.8.1-1sarge1
libwpd8-dev - 0.8.1-1sarg

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 92%
0.08757
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

ubuntu
больше 18 лет назад

Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. NOTE: the integer overflow has been split into CVE-2007-1466.

redhat
больше 18 лет назад

Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. NOTE: the integer overflow has been split into CVE-2007-1466.

nvd
больше 18 лет назад

Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. NOTE: the integer overflow has been split into CVE-2007-1466.

debian
больше 18 лет назад

Multiple heap-based buffer overflows in WordPerfect Document importer/ ...

github
больше 3 лет назад

Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. NOTE: the integer overflow has been split into CVE-2007-1466.

EPSS

Процентиль: 92%
0.08757
Низкий

9.3 Critical

CVSS2