| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" |
| "http://www.w3.org/TR/html4/loose.dtd"> |
| <html> |
| <head> |
| <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> |
| <title>CVE-2006-5870</title> |
| <style type="text/css"> |
| /*<![CDATA[*/ |
| hr { display: block } |
| /*]]>*/ |
| </style> |
| |
| </head> |
| <body> |
| <h2>CVE-2006-5870</h2> |
| <h3>WMF/EMF Processing Failures </h3> |
| <ul> |
| <li> <strong>Synopsis: </strong>Security vulnerability with some WMF/EMF files |
| <li> <strong>Issue ID: </strong>70042 |
| <li> <strong>State: </strong>Resolved |
| </ul> |
| <h4>1. Impact</h4> |
| <p>A security vulnerability in OpenOffice.org requiring a tricked user to open a special WMF/EMF file may lead to the user's computer being compromised. </p> |
| <p> |
| This issue is also described in<br> |
| CVE-2006-5870, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870</a><br> |
| US-Cert, |
| <a href="http://www.kb.cert.org/vuls/id/220288"> |
| http://www.kb.cert.org/vuls/id/220288</a></p> |
| <h4>2. Affected releases </h4> |
| <p>OpenOffice.org 1.1.x, OpenOffice.org 2.0.x</p> |
| <h4>3. Symptoms</h4> |
| <p>There are no predictable symptoms that would indicate the described issue has been exploited.</p> |
| <h4>4. Relief/Workaround</h4> |
| <p>There is no workaround. See "Resolution" below. </p> |
| <h4>5. Resolution</h4> |
| <p>This issue is addressed in the following releases:</p> |
| <p><strong>OpenOffice.org 1.1.5 Patch, OpenOffice.org 2.1.x</strong></p> |
| <hr /> |
| <p> |
| <a href="//security/">Security Home</a> -> |
| <a href="//security/bulletin.html">Bulletin</a> -> |
| <a href="//security/cves/CVE-2006-5870.html">CVE-2006-5870</a> |
| </p> |
| |
| </body> |
| </html> |