exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 2487-1

Debian Security Advisory 2487-1
Posted Jun 8, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2487-1 - It was discovered that OpenOffice.org would not properly process crafted document files, possibly leading to arbitrary code execution.

tags | advisory, arbitrary, code execution
systems | linux, debian
advisories | CVE-2012-1149, CVE-2012-2334
SHA-256 | 2d9dc06a415f8fc293156688adb0ebd1a69dcf3baec35646794fe891a2131701

Debian Security Advisory 2487-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2487-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
June 07, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openoffice.org
Vulnerability : buffer overflow
Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2012-1149 CVE-2012-2334

It was discovered that OpenOffice.org would not properly process
crafted document files, possibly leading to arbitrary code execution.

CVE-2012-1149
Integer overflows in PNG image handling

CVE-2012-2334
Integer overflow in operator new[] invocation and heap-based
buffer overflow inside the MS-ODRAW parser

For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.1-11+squeeze6.

For the unstable distribution (sid), these problems have been fixed in
version 1:3.5.2~rc2-1 of the libreoffice package.

We recommend that you upgrade your openoffice.org packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJP0P4UAAoJEL97/wQC1SS+xVsH/RryzKONh1SBGKN4osq27UH2
774tOERttRzsDgipwpp560aPMM04rLfH2k3Os9vk3zvzgwnBd4e7GeLKYbTkK/M7
g1zIPNRjGbLxREsTbdXYbgB86+PWjtd4Ex6TPFsPWPyOheqZMKEj2clNOW32ZKfV
X7vBXDt3OlxrZo4Vxy6Q33HGF0Nf9eJv9N0se4o4mZJ/Uom8LpgOrfy4Lwsyxkkg
csRrzqus9GgYpvjpf9R10YCj11rpXojGybZL6Xz5MPrqTcD6c2pTTTvIWczKTy5j
QlYGuu/l4sTql5aZjdbIt/TAThQpKDPSIBc10/Br/sTER1YrrYuDj0ZDY8PR5cQ=
=3nsr
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    30 Files
  • 29
    Nov 29th
    35 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close