CVE-2012-1149
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
21/06/2012
Last modified:
11/04/2025
Description
Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a .DOC file, which triggers a heap-based buffer overflow.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:* | 3.5.2 (including) | |
| cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:openoffice.org:3.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:openoffice.org:3.4:beta:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2012-05/0089.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081319.html
- http://rhn.redhat.com/errata/RHSA-2012-0705.html
- http://secunia.com/advisories/46992
- http://secunia.com/advisories/47244
- http://secunia.com/advisories/49140
- http://secunia.com/advisories/49373
- http://secunia.com/advisories/49392
- http://secunia.com/advisories/50692
- http://secunia.com/advisories/60799
- http://security.gentoo.org/glsa/glsa-201209-05.xml
- http://securitytracker.com/id?1027068=
- http://www.debian.org/security/2012/dsa-2473
- http://www.debian.org/security/2012/dsa-2487
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://www.libreoffice.org/advisories/cve-2012-1149/
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A090
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A091
- http://www.openoffice.org/security/cves/CVE-2012-1149.html
- http://www.osvdb.org/81988
- http://www.securityfocus.com/bid/53570
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75692
- http://archives.neohapsis.com/archives/bugtraq/2012-05/0089.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081319.html
- http://rhn.redhat.com/errata/RHSA-2012-0705.html
- http://secunia.com/advisories/46992
- http://secunia.com/advisories/47244
- http://secunia.com/advisories/49140
- http://secunia.com/advisories/49373
- http://secunia.com/advisories/49392
- http://secunia.com/advisories/50692
- http://secunia.com/advisories/60799
- http://security.gentoo.org/glsa/glsa-201209-05.xml
- http://securitytracker.com/id?1027068=
- http://www.debian.org/security/2012/dsa-2473
- http://www.debian.org/security/2012/dsa-2487
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://www.libreoffice.org/advisories/cve-2012-1149/
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A090
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A091
- http://www.openoffice.org/security/cves/CVE-2012-1149.html
- http://www.osvdb.org/81988
- http://www.securityfocus.com/bid/53570
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75692



