7.2 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.062 Low
EPSS
Percentile
93.5%
OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html
lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html
lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html
lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
secunia.com/advisories/40070
secunia.com/advisories/40084
secunia.com/advisories/40104
secunia.com/advisories/40107
secunia.com/advisories/41818
secunia.com/advisories/60799
ubuntu.com/usn/usn-949-1
www.debian.org/security/2010/dsa-2055
www.gentoo.org/security/en/glsa/glsa-201408-19.xml
www.mandriva.com/security/advisories?name=MDVSA-2010:221
www.openoffice.org/security/cves/CVE-2010-0395.html
www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
www.redhat.com/support/errata/RHSA-2010-0459.html
www.us-cert.gov/cas/techalerts/TA10-287A.html
www.vupen.com/english/advisories/2010/1350
www.vupen.com/english/advisories/2010/1353
www.vupen.com/english/advisories/2010/1366
www.vupen.com/english/advisories/2010/1369
www.vupen.com/english/advisories/2010/2905
bugzilla.redhat.com/show_bug.cgi?id=574119
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091