Return-Path: X-Original-To: apmail-incubator-ooo-users-archive@minotaur.apache.org Delivered-To: apmail-incubator-ooo-users-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 3F8489109 for ; Wed, 16 May 2012 15:00:00 +0000 (UTC) Received: (qmail 71827 invoked by uid 500); 16 May 2012 14:59:59 -0000 Delivered-To: apmail-incubator-ooo-users-archive@incubator.apache.org Received: (qmail 71610 invoked by uid 500); 16 May 2012 14:59:59 -0000 Mailing-List: contact ooo-users-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: ooo-users@incubator.apache.org Delivered-To: mailing list ooo-users@incubator.apache.org Received: (qmail 71216 invoked by uid 99); 16 May 2012 14:59:59 -0000 Received: from minotaur.apache.org (HELO minotaur.apache.org) (140.211.11.9) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 16 May 2012 14:59:59 +0000 Received: from localhost (HELO mail-vb0-f47.google.com) (127.0.0.1) (smtp-auth username robweir, mechanism plain) by minotaur.apache.org (qpsmtpd/0.29) with ESMTP; Wed, 16 May 2012 14:59:58 +0000 Received: by vbbfr13 with SMTP id fr13so807354vbb.6 for ; Wed, 16 May 2012 07:59:57 -0700 (PDT) MIME-Version: 1.0 Received: by 10.220.40.148 with SMTP id k20mr2609495vce.17.1337180397512; Wed, 16 May 2012 07:59:57 -0700 (PDT) Received: by 10.220.190.13 with HTTP; Wed, 16 May 2012 07:59:57 -0700 (PDT) Date: Wed, 16 May 2012 10:59:57 -0400 Message-ID: Subject: [SECURITY] CVE-2012-1149 OpenOffice.org integer overflow error in vclmi.dll module when allocating memory for an embedded image object From: Rob Weir To: ooo-dev@incubator.apache.org, ooo-users@incubator.apache.org Cc: ooo-announce@incubator.apache.org Content-Type: text/plain; charset=UTF-8 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 CVE-2012-1149 OpenOffice.org integer overflow error in vclmi.dll module when allocating memory for an embedded image object Reference: http://www.openoffice.org/security/cves/CVE-2012-1149.html Severity: Important Vendor: The Apache Software Foundation Versions Affected: OpenOffice.org 3.3 and 3.4 Beta, on all platforms. Earlier versions may be also affected. Description: The vulnerability is caused due to an integer overflow error in the vclmi.dll module when allocating memory for an embedded image object. This can be exploited to cause a heap-based buffer overflow via, for example using a specially crafted JPEG object within a DOC file. Mitigation OpenOffice.org 3.3.0 and 3.4 beta users are advised to upgrade to Apache OpenOffice 3.4. Users who are unable to upgrade immediately should be cautious when opening untrusted documents. Credits The Apache OpenOffice Security Team credits Tielei Wang via Secunia SVCRP as the discoverer of this flaw. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBCgAGBQJPs8AZAAoJEGFAoYdHzLzHP18P/jAzoagU2m7A6xmlrnM0obXE J/+jkn/1T9SeUZqoV8Kxj3Xm079824SkGCfV+Vh449aEjz9mOcYeYdzF/Q2bLHUc 5+RASR10/KGUrONwTW7Y7aHgJKULqACayEAibtJdjTQf2c6bmPQtP0NvqBvqRnwO I47wgF3nz7yTzmyJxCbM4c2zZl5yZ4fV+PScu4oignKCKWdihGWpyCsC68uaCaNL /++Ef62uFg0ZhCHxbMeeg6XxG/I0AwDuCjLJucmZiTMFalVRilZ7RAJTq333pZO5 Ll1gOZhVFMahYWUuyRfEvSxthd1/XH8qSqaqZ7iIW636QorSReexCbyU6L8D+/J9 y5Z/ldgjT37/Y2HOtshugZ2/YYasORQRDG6dcfTsagBSz0t6NI8XjZ5HrOv2A+gq 2tUokw5wRWd0U/oi6HZVwbgsE93WlK2TacHKJEs3Ej7g9t/hmeQKlkgczy0DH7WB sDNadAqJLCzgc/84MY4ZDDSx9bmYUJGwXJwo0yGtZEVdSD9sJbnVqw6pLBZoLXRZ hAkaBnCJTackjfzaisd7+x+iLVUp1S2fllcTAoNUMehRhjtCP8MCwIqcEQL+QUyj yQRcFO4+r20NTGNPaAiwanu/H4tUe+HZErh2T/NEWh4LXqrxdQWbVHMTFLM4BNgX cKjC87ugWCKXVyyTQKiA =HHf0 -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: ooo-users-unsubscribe@incubator.apache.org For additional commands, e-mail: ooo-users-help@incubator.apache.org