First published: Mon Aug 09 2010(Updated: )
An integer truncation error, leading to heap-based buffer overflow was found in the way OpenOffice.org Impress presentation application sanitized dictionary property items of the processed file. An attacker could use this flaw to create a specially-crafted Microsoft PowerPoint (PPT) file that, when opened, would cause simpress.bin executable to crash, or, possibly execute arbitrary code with the privileges of the user running the ooimpress tool. References: [1] <a href="http://secunia.com/advisories/40775/">http://secunia.com/advisories/40775/</a> [2] <a href="http://securityevaluators.com/files/papers/CrashAnalysis.pdf">http://securityevaluators.com/files/papers/CrashAnalysis.pdf</a> [3] <a href="http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690">http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690</a> CVE Request: [4] <a href="http://www.openwall.com/lists/oss-security/2010/08/11/1">http://www.openwall.com/lists/oss-security/2010/08/11/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | =3.2.1 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2935 is rated as a high severity vulnerability due to the potential for a heap-based buffer overflow.
To address CVE-2010-2935, you should upgrade to a patched version of OpenOffice.org that resolves this integer truncation error.
An attacker can exploit CVE-2010-2935 by crafting a malicious Microsoft PowerPoint file that triggers the buffer overflow when processed.
CVE-2010-2935 specifically affects OpenOffice.org version 3.2.1.
CVE-2010-2935 is relevant for OpenOffice.org on Microsoft Windows, but does not affect the operating system directly.