Vulnerability Name: | CVE-2012-2149 (CCN-75694) | ||||||||||||||||||||
Assigned: | 2012-05-16 | ||||||||||||||||||||
Published: | 2012-05-16 | ||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||
Summary: | The WPXContentListener::_closeTableRow function in WPXContentListener.cpp in libwpd 0.8.8, as used by OpenOffice.org (OOo) before 3.4, allows remote attackers to execute arbitrary code via a crafted Wordperfect .WPD document that causes a negative array index to be used. Note: some sources report this issue as an integer overflow. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: MITRE Type: CNA CVE-2012-2149 Source: secalert@redhat.com Type: Exploit, Third Party Advisory, VDB Entry secalert@redhat.com Source: CCN Type: RHSA-2012-1043 Important: libwpd security update Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: SA46992 OpenOffice.org Two Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Open Office Web Site OpenOffice.org memory overwrite vulnerability Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: OSVDB ID: 81989 OpenOffice.org (OOo) WPXContentListener.cpp WPXContentListener::_closeTableRow() Function Wordperfect Document Handling Remote Code Execution Source: CCN Type: BID-53570 OpenOffice Prior to 3.4 Multiple Memory Corruption Vulnerabilities Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: XF Type: UNKNOWN openoffice-wordperfect-code-execution(75694) Source: secalert@redhat.com Type: Exploit secalert@redhat.com | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |