Vulnerabilità: CVE-2007-4575

HSQLDB prima 1.8.0.9, come utilizzato in OpenOffice.org (OOo) 2 prima 2.3.1, permette all’utente-assistito ad aggressori remoti di eseguire codice arbitrario in Java su documenti di database artigianali, correlate a ""esporre metodi Java statici.""


http://www.securityfocus.com/bid/26703
http://www.openoffice.org/security/cves/CVE-2007-4575.html
http://www.debian.org/security/2007/dsa-1419
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00753.html
http://www.redhat.com/archives/fedora-package-announce/2007-December/msg00134.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00678.html
http://www.redhat.com/archives/fedora-package-announce/2007-December/msg00155.html
http://www.redhat.com/archives/fedora-package-announce/2007-December/msg00281.html
http://www.gentoo.org/security/en/glsa/glsa-200712-25.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:095
http://bugs.gentoo.org/show_bug.cgi?id=200771
http://bugs.gentoo.org/show_bug.cgi?id=201799
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10153
http://www.redhat.com/support/errata/RHSA-2007-1048.html
http://www.redhat.com/support/errata/RHSA-2007-1090.html
http://www.redhat.com/support/errata/RHSA-2008-0151.html
http://www.redhat.com/support/errata/RHSA-2008-0158.html
http://www.redhat.com/support/errata/RHSA-2008-0213.html
http://www.securitytracker.com/id?1019041
http://secunia.com/advisories/27914
http://secunia.com/advisories/27916
http://secunia.com/advisories/27928
http://secunia.com/advisories/27931
http://secunia.com/advisories/27972
http://secunia.com/advisories/28018
http://secunia.com/advisories/28039
http://secunia.com/advisories/28286
http://secunia.com/advisories/28585
http://secunia.com/advisories/30100
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103141-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200637-1
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00005.html
http://www.ubuntu.com/usn/usn-609-1
http://www.vupen.com/english/advisories/2007/4092
http://www.vupen.com/english/advisories/2007/4146
https://exchange.xforce.ibmcloud.com/vulnerabilities/38882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi