OpenOffice.org Multiple Vulnerabilities
Last Update Date:
1 Feb 2011
Release Date:
28 Jan 2011
6332
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Multiple vulnerabilities have been identified in OpenOffice.org, which could be exploited by remote attackers to compromise a vulnerable system.
- A buffer overflow error when processing malformed TGA files, which could be exploited by attackers to execute arbitrary code by convincing a user to open a malicious document (e.g. ODF or Office).
- A buffer overflow error when processing malformed PNG files, which could be exploited by attackers to execute arbitrary code by convincing a user to open a malicious document (e.g. ODF or Office).
- A memory corruption error within the "WW8ListManager::WW8ListManager()" function when processing malformed data, which could be exploited to execute arbitrary code by tricking a user into opening a specially crafted Word document.
- A memory corruption error within the "WW8DopTypography::ReadFromMem()" function when processing malformed data, which could be exploited to execute arbitrary code by tricking a user into opening a specially crafted Word document.
- A memory corruption error when processing malformed RTF data, which could be exploited by attackers to execute arbitrary code by convincing a user to open a malicious RTF document.
- A memory corruption error when processing malformed RTF data, which could be exploited by attackers to execute arbitrary code by convincing a user to open a malicious RTF document.
- A directory traversal error related to zip/jar package extraction, which could allow attackers to overwrite arbitrary files.
- An error in the start script and other shell scripts when handling "LD_LIBRARY_PATH" while searching for libraries within the current directory, which could lead to code execution.
- A buffer overflow error when processing malformed PPT files.
- buffer overflow error when processing malformed PPT files.
Other vulnerabilities related to third party libraries Xpdf and Libxml2 have also been reported.
Impact
- Remote Code Execution
System / Technologies affected
- OpenOffice.org versions prior to 3.3
- OpenOffice.org versions 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to OpenOffice.org version 3.3 :
http://download.openoffice.org/
Vulnerability Identifier
- CVE-2010-2935
- CVE-2010-2936
- CVE-2010-3450
- CVE-2010-3451
- CVE-2010-3452
- CVE-2010-3453
- CVE-2010-3454
- CVE-2010-3689
- CVE-2010-3702
- CVE-2010-3704
- CVE-2010-4008
- CVE-2010-4253
- CVE-2010-4494
- CVE-2010-4643
Source
Related Link
- http://www.openoffice.org/security/cves/CVE-2010-4643.html
- http://www.openoffice.org/security/cves/CVE-2010-4253.html
- http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
- http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
- http://www.openoffice.org/security/cves/CVE-2010-3689.html
- http://www.openoffice.org/security/cves/CVE-2010-3453_CVE-2010-3454.html
- http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html
- http://www.openoffice.org/security/cves/CVE-2010-3450.html
- http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html
- http://www.vupen.com/english/advisories/2011/0230
Share with