Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2006-4514
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-30 Nov, 2006 | 23:00
Updated At-07 Aug, 2024 | 19:14
Rejected At-
▼CVE Numbering Authority (CNA)

Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://issues.rpath.com/browse/RPL-857
x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2007-0011.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/23167
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23920
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23352
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200612-13.xml
vendor-advisory
x_refsource_GENTOO
http://www.ubuntu.com/usn/usn-391-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/23227
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/21358
vdb-entry
x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:220
vendor-advisory
x_refsource_MANDRIVA
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446
third-party-advisory
x_refsource_IDEFENSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/30611
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2006/4784
vdb-entry
x_refsource_VUPEN
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html
vendor-advisory
x_refsource_SUSE
http://www.securityfocus.com/archive/1/454389/30/9210/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/23166
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23337
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/23355
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1221
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/23164
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23686
third-party-advisory
x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc
vendor-advisory
x_refsource_SGI
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
x_refsource_CONFIRM
Hyperlink: https://issues.rpath.com/browse/RPL-857
Resource:
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0011.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/23167
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23920
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23352
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-200612-13.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.ubuntu.com/usn/usn-391-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/23227
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/21358
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:220
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446
Resource:
third-party-advisory
x_refsource_IDEFENSE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/30611
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2006/4784
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securityfocus.com/archive/1/454389/30/9210/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/23166
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23337
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/23355
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1221
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/23164
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23686
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://issues.rpath.com/browse/RPL-857
x_refsource_CONFIRM
x_transferred
http://rhn.redhat.com/errata/RHSA-2007-0011.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/23167
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23920
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23352
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200612-13.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.ubuntu.com/usn/usn-391-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/23227
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/21358
vdb-entry
x_refsource_BID
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:220
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446
third-party-advisory
x_refsource_IDEFENSE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/30611
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2006/4784
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securityfocus.com/archive/1/454389/30/9210/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/23166
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23337
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/23355
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1221
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/23164
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23686
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
x_refsource_CONFIRM
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-857
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0011.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/23167
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23920
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23352
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200612-13.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-391-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/23227
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/21358
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:220
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446
Resource:
third-party-advisory
x_refsource_IDEFENSE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/30611
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4784
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/454389/30/9210/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/23166
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23337
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/23355
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1221
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/23164
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23686
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Details not found