OpenOffice.org vclmi.dll Integer Overflow

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1047439 漏洞类型
发布时间 2012-05-17 更新时间 2012-05-17
CVE编号 CVE-2012-1149
CVE-2012-1149
CVE-2012-1149
CVE-2012-1149
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2012050131
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

CVE-2012-1149 OpenOffice.org integer overflow error in vclmi.dll module
when allocating memory for an embedded image object

Reference: http://www.openoffice.org/security/cves/CVE-2012-1149.html

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

OpenOffice.org 3.3 and 3.4 Beta, on all platforms.
Earlier versions may be also affected.

Description:

The vulnerability is caused due to an integer overflow error in the
vclmi.dll module when allocating memory for an embedded image object.
This can be exploited to cause a heap-based buffer overflow via, for
example using a specially crafted JPEG object within a DOC file.

Mitigation

OpenOffice.org 3.3.0 and 3.4 beta users are advised to upgrade to
Apache OpenOffice 3.4. Users who are unable to upgrade immediately
should be cautious when opening untrusted documents.

Credits

The Apache OpenOffice Security Team credits Tielei Wang via
Secunia SVCRP as the discoverer of this flaw.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=HHf0
-----END PGP SIGNATURE-----