First published: Tue Oct 05 2010(Updated: )
An integer signedness error, leading to heap-based buffer out-ouf-bounds read was found in the way OpenOffice.org processed certain Rich Text Format (RTF) tags. If a user opened a specially-crafted RTF file in OpenOffice.org suite tool (oowriter), it could lead to denial of service (oowriter executable crash), or possibly, execute arbitrary code with the privileges of the user running OpenOffice.org Writer. References: [1] <a href="http://www.cs.brown.edu/people/drosenbe/research.html">http://www.cs.brown.edu/people/drosenbe/research.html</a> Acknowledgements: Red Hat would like to thank OpenOffice.org for reporting this issue. Upstream acknowledges Dan Rosenberg of Virtual Security Research as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | >=2.0.0<3.3.0 | |
Debian Linux | =5.0 | |
Ubuntu | =10.10 | |
Debian Linux | =6.0 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3452 has a moderate severity rating due to the potential for denial of service through a crafted RTF file.
To fix CVE-2010-3452, users should update their OpenOffice.org to a version later than 3.3.0.
CVE-2010-3452 affects versions of Apache OpenOffice between 2.0.0 and 3.3.0, as well as several versions of Debian and Ubuntu Linux.
CVE-2010-3452 is an integer signedness error resulting in a heap-based buffer out-of-bounds read.
While CVE-2010-3452 primarily leads to denial of service, it may indirectly expose certain data upon a crash.