CVE-2010-2936

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
http://secunia.com/advisories/40775 Vendor Advisory
http://secunia.com/advisories/41052 Vendor Advisory
http://secunia.com/advisories/41235
http://secunia.com/advisories/42927
http://secunia.com/advisories/43105
http://secunia.com/advisories/60799
http://securityevaluators.com/files/papers/CrashAnalysis.pdf
http://ubuntu.com/usn/usn-1056-1
http://www.debian.org/security/2010/dsa-2099
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:221
http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html
http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690
http://www.openwall.com/lists/oss-security/2010/08/11/1
http://www.openwall.com/lists/oss-security/2010/08/11/4
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
http://www.redhat.com/support/errata/RHSA-2010-0643.html
http://www.securitytracker.com/id?1024352
http://www.securitytracker.com/id?1024976
http://www.vupen.com/english/advisories/2010/2003 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2149 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2228
http://www.vupen.com/english/advisories/2010/2905
http://www.vupen.com/english/advisories/2011/0150
http://www.vupen.com/english/advisories/2011/0230
http://www.vupen.com/english/advisories/2011/0279
https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6
https://bugzilla.redhat.com/show_bug.cgi?id=622555
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
http://secunia.com/advisories/40775 Vendor Advisory
http://secunia.com/advisories/41052 Vendor Advisory
http://secunia.com/advisories/41235
http://secunia.com/advisories/42927
http://secunia.com/advisories/43105
http://secunia.com/advisories/60799
http://securityevaluators.com/files/papers/CrashAnalysis.pdf
http://ubuntu.com/usn/usn-1056-1
http://www.debian.org/security/2010/dsa-2099
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:221
http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html
http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690
http://www.openwall.com/lists/oss-security/2010/08/11/1
http://www.openwall.com/lists/oss-security/2010/08/11/4
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
http://www.redhat.com/support/errata/RHSA-2010-0643.html
http://www.securitytracker.com/id?1024352
http://www.securitytracker.com/id?1024976
http://www.vupen.com/english/advisories/2010/2003 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2149 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2228
http://www.vupen.com/english/advisories/2010/2905
http://www.vupen.com/english/advisories/2011/0150
http://www.vupen.com/english/advisories/2011/0230
http://www.vupen.com/english/advisories/2011/0279
https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6
https://bugzilla.redhat.com/show_bug.cgi?id=622555
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:openoffice:openoffice.org:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:17

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html -
References () http://secunia.com/advisories/40775 - Vendor Advisory () http://secunia.com/advisories/40775 - Vendor Advisory
References () http://secunia.com/advisories/41052 - Vendor Advisory () http://secunia.com/advisories/41052 - Vendor Advisory
References () http://secunia.com/advisories/41235 - () http://secunia.com/advisories/41235 -
References () http://secunia.com/advisories/42927 - () http://secunia.com/advisories/42927 -
References () http://secunia.com/advisories/43105 - () http://secunia.com/advisories/43105 -
References () http://secunia.com/advisories/60799 - () http://secunia.com/advisories/60799 -
References () http://securityevaluators.com/files/papers/CrashAnalysis.pdf - () http://securityevaluators.com/files/papers/CrashAnalysis.pdf -
References () http://ubuntu.com/usn/usn-1056-1 - () http://ubuntu.com/usn/usn-1056-1 -
References () http://www.debian.org/security/2010/dsa-2099 - () http://www.debian.org/security/2010/dsa-2099 -
References () http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml - () http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:221 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:221 -
References () http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html - () http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html -
References () http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690 - () http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690 -
References () http://www.openwall.com/lists/oss-security/2010/08/11/1 - () http://www.openwall.com/lists/oss-security/2010/08/11/1 -
References () http://www.openwall.com/lists/oss-security/2010/08/11/4 - () http://www.openwall.com/lists/oss-security/2010/08/11/4 -
References () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0643.html - () http://www.redhat.com/support/errata/RHSA-2010-0643.html -
References () http://www.securitytracker.com/id?1024352 - () http://www.securitytracker.com/id?1024352 -
References () http://www.securitytracker.com/id?1024976 - () http://www.securitytracker.com/id?1024976 -
References () http://www.vupen.com/english/advisories/2010/2003 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2003 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2149 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2149 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2228 - () http://www.vupen.com/english/advisories/2010/2228 -
References () http://www.vupen.com/english/advisories/2010/2905 - () http://www.vupen.com/english/advisories/2010/2905 -
References () http://www.vupen.com/english/advisories/2011/0150 - () http://www.vupen.com/english/advisories/2011/0150 -
References () http://www.vupen.com/english/advisories/2011/0230 - () http://www.vupen.com/english/advisories/2011/0230 -
References () http://www.vupen.com/english/advisories/2011/0279 - () http://www.vupen.com/english/advisories/2011/0279 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6 - () https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=622555 - () https://bugzilla.redhat.com/show_bug.cgi?id=622555 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144 -

Information

Published : 2010-08-25 20:00

Updated : 2024-11-21 01:17


NVD link : CVE-2010-2936

Mitre link : CVE-2010-2936

CVE.ORG link : CVE-2010-2936


JSON object : View

Products Affected

openoffice

  • openoffice.org

microsoft

  • windows
CWE
CWE-189

Numeric Errors