{ "id": "CVE-2008-3437", "sourceIdentifier": "cve@mitre.org", "published": "2008-08-01T14:41:00.000", "lastModified": "2008-09-05T21:43:04.577", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OpenOffice.org (OOo) before 2.1.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning." }, { "lang": "es", "value": "OpenOffice.org (OOo) anterior a 2.1.0 no verifica adecuadamente la autenticidad de las actualizaciones, lo cual permite a a atacantes de tipo 'hombre en el medio' (man-in-the-middle) ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de la actualizaci\u00f3n de un Caballo de Troya, como se demuestra por el grado de da\u00f1o y el envenenamiento de la cach\u00e9 DNS." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "Not vulnerable. This issue did not affect the versions of OpenOffice.org as shipped with Red Hat Enterprise Linux 3, 4, or 5. The updated Red Hat Enterprise Linux packages are not distributed via the openoffice.org update service, but rather via Red Hat Network, using the package manager capabilities to verify authenticity of updates.", "lastModified": "2008-08-04T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:openoffice:openoffice.org:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E697B8A3-447B-4D7B-A02B-191119453CCB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "45DD57AC-8CA4-48DB-90F9-2D7260AB7650" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C065AAB-58E3-4312-AD74-A3E103AC73DB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9487A325-308D-442A-89A9-E8650925F43F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openoffice:openoffice.org:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "D4B493F3-833A-47E9-AB60-BE2D635EF8AC" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html", "source": "cve@mitre.org" }, { "url": "http://securitytracker.com/id?1020583", "source": "cve@mitre.org" }, { "url": "http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf", "source": "cve@mitre.org" } ] }