We found results for “”
WS-2016-7061
Good to know:
Date: October 14, 2016
Apache POI before 3.16-beta1 is vulnerable to bufferoverflow attack due to lack of length sanity check for length of embedded OLE10Native.
Language: Java
Severity Score
Severity Score
Weakness Type (CWE)
Stack-based Buffer Overflow
CWE-121Top Fix
Upgrade Version
Upgrade to version vufind/vufind - v3.1;vufind/vufind - dev-legacy/mink-autoretry;vufind/vufind - dev-pullrequest_accessib_turn-my-account-menu-into-ul;vufind/vufind - dev-release-5.0;vufind/vufind - dev-legacy/lbs4-daia;smart145/phpjasper - v1.5;smart145/phpjasper - v1.8;smart145/phpjasper - v1.1;smart145/phpjasper - 2.0;smart145/phpjasper - v1.11;smart145/phpjasper - v2.6;searchgui - 4.0.4;peptide-shaker - 1.16.26;peptide-shaker - 2.0.5;xidmonx/jasperphp - dev-master;xidmonx/jasperphp - v2.4.0;lavela/phpjasper - v2.0;lavela/phpjasper - dev-master;eoulsan - 2.2;pepquery - 2.0.2;fazo96/jasperphp - no_fix;myparkfolio/jars-jasper-report - no_fix;salesfusion/reporter - 1.1.2;mpa-portable - no_fix;copam/phpjasper - v1.5;copam/phpjasper - 1.4;copam/phpjasper7 - v1.3;copam/phpjasper7 - dev-master;stesabvba/horizon - no_fix;siu-toba/jasper - no_fix;dericktan/phpjasper - v1.2;dericktan/phpjasper - no_fix;a.ambrogini/phpjasper - v1.1;a.ambrogini/phpjasper - v2.6;myparkfolio/jars-poi - no_fix;rdpascua/jasperstarter - 3.5.0;r-xlsxjars - no_fix;silverstripe/fulltextsearch-extract - no_fix;i4n/phpjasper - 1.1.0;ziack/jasperphp - v2.4.0;ziack/jasperphp - dev-master;openrefine - 3.4;cossou/jasperphp - dev-master;cossou/jasperphp - v2.4.0;dia_umpire - no_fix;metanovo - no_fix;starkliew/jasperphp - v2.4.0;minkbear/phpjasper - v2.6;chrmorandi/yii2-jasper - v1.1.1;org.fusesource.examples:camel-drools-example:7.1.0.fuse-047;org.fusesource.examples:camel-drools-example:7.1.0.fuse-047;org.fusesource.examples:camel-drools-example:7.1.0.fuse-047;org.apache.poi:poi:3.16-beta1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.poi:3.16_1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


