First published: Mon Jul 26 2010(Updated: )
A short integer overflow, leading to heap-based buffer overflow was found in the way OpenOffice.org Impress presentation aplication processed polygons in input document. An attacker could use this flaw to create a specially-crafted Microsoft PowerPoint (PPT) file that, when opened, would cause simpress.bin executable to crash, or, possibly execute arbitrary code with the privileges of the user running the ooimpress tool. References: [1] <a href="http://secunia.com/advisories/40775/">http://secunia.com/advisories/40775/</a> [2] <a href="http://securityevaluators.com/files/papers/CrashAnalysis.pdf">http://securityevaluators.com/files/papers/CrashAnalysis.pdf</a> [3] <a href="http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690">http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690</a> CVE Request: [4] <a href="http://www.openwall.com/lists/oss-security/2010/08/11/1">http://www.openwall.com/lists/oss-security/2010/08/11/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openoffice.org2 | <1:2.0.4-5.7.0.6.1.el4_8.6 | 1:2.0.4-5.7.0.6.1.el4_8.6 |
Apache OpenOffice | =3.2.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.