CVE-2014-3575

The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*

History

07 Feb 2022, 16:32

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1030754 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1030754 - Broken Link, Third Party Advisory, VDB Entry
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-September/137657.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-September/137657.html - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59600 - (SECUNIA) http://secunia.com/advisories/59600 - Broken Link
References (CONFIRM) http://www.openoffice.org/security/cves/CVE-2014-3575.html - (CONFIRM) http://www.openoffice.org/security/cves/CVE-2014-3575.html - Vendor Advisory
References (GENTOO) https://security.gentoo.org/glsa/201603-05 - (GENTOO) https://security.gentoo.org/glsa/201603-05 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/69354 - (BID) http://www.securityfocus.com/bid/69354 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://blog.documentfoundation.org/2014/08/28/libreoffice-4-3-1-fresh-announced/ - (CONFIRM) http://blog.documentfoundation.org/2014/08/28/libreoffice-4-3-1-fresh-announced/ - Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/95420 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/95420 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/59877 - (SECUNIA) http://secunia.com/advisories/59877 - Broken Link
CPE cpe:2.3:a:sun:openoffice.org:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.4:beta_1:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:3.1.9420:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.4:beta:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:3.3.9567:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice.org:4.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
CWE CWE-264 CWE-200

Information

Published : 2014-08-27 00:55

Updated : 2024-02-04 18:35


NVD link : CVE-2014-3575

Mitre link : CVE-2014-3575

CVE.ORG link : CVE-2014-3575


JSON object : View

Products Affected

libreoffice

  • libreoffice

redhat

  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • enterprise_linux_server

apache

  • openoffice
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor