Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-vrpb-u4tv-sqdj
Vulnerability ID VCID-vrpb-u4tv-sqdj
Aliases CVE-2008-0320
Summary Multiple vulnerabilities have been reported in OpenOffice.org, possibly allowing for user-assisted execution of arbitrary code.
Status Published
Exploitability 2.0
Weighted Severity 0.7
Risk 1.4
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added May 25, 2012
Description OpenOffice - OLE Importer DocumentSummaryInformation Stream Handling Overflow (Metasploit)
Ransomware campaign use Known
Source publication date May 25, 2012
Exploit type local
Platform windows
Source update date May 25, 2012
Data source Metasploit
Description This module exploits a vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft Windows XP SP3. By supplying a OLE file with a malformed DocumentSummaryInformation stream, an attacker can gain control of the execution flow, which results arbitrary code execution under the context of the user.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date April 17, 2008
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/fileformat/openoffice_ole.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.99198
EPSS Score 0.82
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:01:14.625969+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/200805-16 38.0.0