9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
OpenOffice.org is vulnerable to arbitrary code execution. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way OpenOffice.org parsed XPM files. An attacker could create a specially-crafted document, which once opened by a local, unsuspecting user, could lead to arbitrary code execution with the permissions of the user running OpenOffice.org. Note: This flaw affects embedded XPM files in OpenOffice.org documents as well as stand-alone XPM files.
lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html
secunia.com/advisories/38567
secunia.com/advisories/38568
secunia.com/advisories/38695
secunia.com/advisories/38921
secunia.com/advisories/41818
secunia.com/advisories/60799
securitytracker.com/id?1023591
www.debian.org/security/2010/dsa-1995
www.gentoo.org/security/en/glsa/glsa-201408-19.xml
www.mandriva.com/security/advisories?name=MDVSA-2010:221
www.openoffice.org/security/bulletin.html
www.openoffice.org/security/cves/CVE-2009-2949.html
www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0101.html
www.securityfocus.com/bid/38218
www.ubuntu.com/usn/USN-903-1
www.us-cert.gov/cas/techalerts/TA10-287A.html
www.vupen.com/english/advisories/2010/0366
www.vupen.com/english/advisories/2010/0635
www.vupen.com/english/advisories/2010/2905
access.redhat.com/errata/RHSA-2010:0101
bugzilla.redhat.com/show_bug.cgi?id=527540
exchange.xforce.ibmcloud.com/vulnerabilities/56236
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10176