Lucene search

K
debianDebianDEBIAN:164A0D440A790B5CCC79E58B61A70762:56B73
HistorySep 12, 2010 - 7:39 p.m.

Security update for openoffice.org

2010-09-1219:39:12
lists.debian.org
32

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.149 Low

EPSS

Percentile

95.3%

Rene Engelhard uploaded new packages for openoffice.org which fixed the
following security problems:

CVE-2010-2935 CVE-2010-2936:

Charlie Miller has discovered two vulnerabilities in OpenOffice.org
Impress, which can be exploited by malicious people to compromise a
user's system and execute arbitrary code.

1) An integer truncation error when parsing certain content can be
exploited to cause a heap-based buffer overflow via a specially
crafted file.

2) A short integer overflow error when parsing certain content can
be exploited to cause a heap-based buffer overflow via a specially
crafted file.

For the lenny-backports distribution the problems have been fixed in
version 1:3.2.1-6~bpo50+1.

For the squeeze and sid distributions the problems have been fixed in
version 1:3.2.1-6.

Upgrade instructions

If you don't use pinning (see [1]) you have to update the package
manually via "apt-get -t lenny-backports install <packagelist>" with
the packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions&gt;

We recommend to pin the backports repository to 200 so that new
versions of installed backports will be installed automatically.

Package: *
Pin: release a=lenny-backports
Pin-Priority: 200

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.149 Low

EPSS

Percentile

95.3%