Check Point Advisories

Update Protection against OpenOffice TIFF File Parsing Integer Overflow Vulnerability

Check Point Reference: CPAI-2007-120
Date Published: 28 Oct 2007
Severity: Medium
Last Updated: Monday 01 January, 2007
Source: FrSIRT/ADV-2007-3184
Industry Reference:CVE-2007-2834
Protection Provided by:
Who is Vulnerable? OpenOffice.org OpenOffice Prior to 2.3.0
Vulnerability Description An integer overflow vulnerability has been identified in the OpenOffice software suite. OpenOffice is an open source office suite that is capable of processing several types of graphic document formats, including the Tagged Image File Format (TIFF). A remote attacker could exploit this issue via a malformed TIFF file. Successful exploitation of this vulnerability may allow execution of arbitrary code on a target system.
Update/Patch AvaliableUpgrade to OpenOffice.org version 2.3:
OpenOffice
Vulnerability DetailsThe vulnerability is due to an error in OpenOffice that fails to properly parse malformed Tagged Image File Format (TIFF) images. A remote attacker could trigger this flaw by convincing a victim to open a specially OpenOffice TIFF file. Successful exploitation of this issue may allow execution of arbitrary code on a vulnerable system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK