Upstream information
Description
Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 7.6 | 
| Vector | AV:N/AC:H/Au:N/C:C/I:C/A:C | 
| Access Vector | Network | 
| Access Complexity | High | 
| Authentication | None | 
| Confidentiality Impact | Complete | 
| Integrity Impact | Complete | 
| Availability Impact | Complete | 
SUSE Security Advisories:
- SUSE-SA:2006:040, published Mon, 03 Jul 2006 16:00:00 +0000
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| openSUSE Tumbleweed | 
  |  Patchnames:  openSUSE-Tumbleweed-2024-10983  | 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 03:24:32 2013CVE page last modified: Sat Nov 1 19:18:03 2025