blob: d95c8c96d42e9c9105e66dfb4658020d1eebeea9 [file] [log] [blame]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>CVE-2006-5870</title>
<style type="text/css">
/*<![CDATA[*/
hr { display: block }
/*]]>*/
</style>
</head>
<body>
<h2>CVE-2006-5870</h2>
<h3>WMF/EMF Processing Failures </h3>
<ul>
<li> <strong>Synopsis: </strong>Security vulnerability with some WMF/EMF files
<li> <strong>Issue ID: </strong>70042
<li> <strong>State: </strong>Resolved
</ul>
<h4>1. Impact</h4>
<p>A security vulnerability in OpenOffice.org requiring a tricked user to open a special WMF/EMF file may lead to the user's computer being compromised. </p>
<p>
This issue is also described in<br>
CVE-2006-5870, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870</a><br>
US-Cert,
<a href="http://www.kb.cert.org/vuls/id/220288">
http://www.kb.cert.org/vuls/id/220288</a></p>
<h4>2. Affected releases </h4>
<p>OpenOffice.org 1.1.x, OpenOffice.org 2.0.x</p>
<h4>3. Symptoms</h4>
<p>There are no predictable symptoms that would indicate the described issue has been exploited.</p>
<h4>4. Relief/Workaround</h4>
<p>There is no workaround. See &quot;Resolution&quot; below. </p>
<h4>5. Resolution</h4>
<p>This issue is addressed in the following releases:</p>
<p><strong>OpenOffice.org 1.1.5 Patch, OpenOffice.org 2.1.x</strong></p>
<hr />
<p>
<a href="//security/">Security Home</a> ->
<a href="//security/bulletin.html">Bulletin</a> ->
<a href="//security/cves/CVE-2006-5870.html">CVE-2006-5870</a>
</p>
</body>
</html>