Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2007-0002

CVE information

Published

15 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. NOTE: the integer overflow has been split into CVE-2007-1466..

CVSSv2.0 Score

Severity
High
Base Score
9.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:libwpd:libwpd_library:0.8.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libwpd:libwpd_library:0.8.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libwpd:libwpd_library:0.8.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libwpd:libwpd_library:*:*:*:*:*:*:*:*
  Yes
- -

References