9.3

CVE-2010-3450

Multiple directory traversal vulnerabilities in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to overwrite arbitrary files via a .. (dot dot) in an entry in (1) an XSLT JAR filter description file, (2) an Extension (aka OXT) file, or unspecified other (3) JAR or (4) ZIP files.

Data is provided by the National Vulnerability Database (NVD)
ApacheOpenoffice Version >= 2.0.0 < 3.3.0
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04
CanonicalUbuntu Linux Version10.10
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.02% 0.83
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

http://ubuntu.com/usn/usn-1056-1
Third Party Advisory
http://www.securityfocus.com/bid/46031
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1025002
Third Party Advisory
Broken Link
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=602324
Patch
Third Party Advisory
Issue Tracking