First published: Tue Oct 06 2009(Updated: )
It was reported that it was possible to trigger an integer overflow that leads to a heap overflow due to the way OpenOffice.org parsed XPM files. This could allow an attacker to execute abitrary code with the permissions of the user running OpenOffice.org, provided they could coerce them to open a malicious document containing a specially crafted XPM file. This is not restricted to XPM files alone, but to embedded XPM files in OpenOffice.org documents. The vulnerability can be found in XPMReader::ReadXPM (source/filter.vcl/ixpm/svt_xpmread.cxx) This vulnerability has been assigned <a href="https://access.redhat.com/security/cve/CVE-2009-2949">CVE-2009-2949</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-527540 is high due to the potential for remote code execution.
To fix REDHAT-BUG-527540, ensure that you update Apache OpenOffice to the latest patched version.
The affected software for REDHAT-BUG-527540 includes Apache OpenOffice.
Yes, REDHAT-BUG-527540 can lead to unauthorized access through arbitrary code execution when XPM files are opened.
A workaround for REDHAT-BUG-527540 is to avoid opening untrusted XPM files using Apache OpenOffice.