First published: Mon Jul 26 2010(Updated: )
A short integer overflow, leading to heap-based buffer overflow was found in the way OpenOffice.org Impress presentation aplication processed polygons in input document. An attacker could use this flaw to create a specially-crafted Microsoft PowerPoint (PPT) file that, when opened, would cause simpress.bin executable to crash, or, possibly execute arbitrary code with the privileges of the user running the ooimpress tool. References: [1] <a href="http://secunia.com/advisories/40775/">http://secunia.com/advisories/40775/</a> [2] <a href="http://securityevaluators.com/files/papers/CrashAnalysis.pdf">http://securityevaluators.com/files/papers/CrashAnalysis.pdf</a> [3] <a href="http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690">http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690</a> CVE Request: [4] <a href="http://www.openwall.com/lists/oss-security/2010/08/11/1">http://www.openwall.com/lists/oss-security/2010/08/11/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openoffice.org2 | <1:2.0.4-5.7.0.6.1.el4_8.6 | 1:2.0.4-5.7.0.6.1.el4_8.6 |
Apache OpenOffice | =3.2.1 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2936 has a high severity rating due to its risk of allowing remote code execution through crafted files.
To fix CVE-2010-2936, update OpenOffice.org to version 3.2.1 or install the specified remedial version 1:2.0.4-5.7.0.6.1.el4_8.6.
CVE-2010-2936 affects OpenOffice.org versions prior to 3.2.1 and certain older versions of the redhat package openoffice.org2.
Yes, CVE-2010-2936 can be exploited remotely by tricking a user into opening a maliciously crafted PowerPoint file.
CVE-2010-2936 is classified as a heap-based buffer overflow resulting from a short integer overflow.