Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-0395

Publication date 8 June 2010

Last updated 24 July 2024


Ubuntu priority

OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.

From the Ubuntu Security Team

Marc Schoenefeld discovered that OpenOffice.org would run document macros from the macro browser, even when macros were disabled. If a user were tricked into opening a specially crafted document and examining a macro, a remote attacker could execute arbitrary code with user privileges.

Status

Package Ubuntu Release Status
openoffice.org 10.04 LTS lucid
Fixed 1:3.2.0-7ubuntu4.1
9.10 karmic
Fixed 1:3.1.1-5ubuntu1.2
9.04 jaunty
Fixed 1:3.0.1-9ubuntu3.3
8.04 LTS hardy
Fixed 1:2.4.1-1ubuntu2.4
6.06 LTS dapper Ignored end of life

References

Related Ubuntu Security Notices (USN)

    • USN-949-1
    • OpenOffice.org vulnerability
    • 8 June 2010

Other references