CVE-2015-5212

Integer underflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2, when the configuration setting "Load printer settings with the document" is enabled, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted PrinterSetup data in an ODF document.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2015-2619.html Third Party Advisory
http://www.debian.org/security/2015/dsa-3394 Third Party Advisory
http://www.libreoffice.org/about-us/security/advisories/cve-2015-5212/ Vendor Advisory
http://www.openoffice.org/security/cves/CVE-2015-5212.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Third Party Advisory
http://www.securityfocus.com/bid/77486 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034085 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034091 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2793-1 Third Party Advisory
https://security.gentoo.org/glsa/201603-05 Third Party Advisory
https://security.gentoo.org/glsa/201611-03 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2619.html Third Party Advisory
http://www.debian.org/security/2015/dsa-3394 Third Party Advisory
http://www.libreoffice.org/about-us/security/advisories/cve-2015-5212/ Vendor Advisory
http://www.openoffice.org/security/cves/CVE-2015-5212.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Third Party Advisory
http://www.securityfocus.com/bid/77486 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034085 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034091 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2793-1 Third Party Advisory
https://security.gentoo.org/glsa/201603-05 Third Party Advisory
https://security.gentoo.org/glsa/201611-03 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2015-2619.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-2619.html - Third Party Advisory
References () http://www.debian.org/security/2015/dsa-3394 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3394 - Third Party Advisory
References () http://www.libreoffice.org/about-us/security/advisories/cve-2015-5212/ - Vendor Advisory () http://www.libreoffice.org/about-us/security/advisories/cve-2015-5212/ - Vendor Advisory
References () http://www.openoffice.org/security/cves/CVE-2015-5212.html - Vendor Advisory () http://www.openoffice.org/security/cves/CVE-2015-5212.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - Third Party Advisory
References () http://www.securityfocus.com/bid/77486 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/77486 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034085 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034085 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034091 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034091 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2793-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2793-1 - Third Party Advisory
References () https://security.gentoo.org/glsa/201603-05 - Third Party Advisory () https://security.gentoo.org/glsa/201603-05 - Third Party Advisory
References () https://security.gentoo.org/glsa/201611-03 - Third Party Advisory () https://security.gentoo.org/glsa/201611-03 - Third Party Advisory

Information

Published : 2015-11-10 17:59

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5212

Mitre link : CVE-2015-5212

CVE.ORG link : CVE-2015-5212


JSON object : View

Products Affected

canonical

  • ubuntu_linux

apache

  • openoffice

debian

  • debian_linux

libreoffice

  • libreoffice
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)