#VU43698 Heap-based buffer overflow in calligra - CVE-2012-3456
Published: August 20, 2012 / Updated: August 11, 2020
calligra
KDE.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier. A remote attacker can use a crafted ODF style in an ODF document. NOTE to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html
- http://marc.info/?l=bugtraq&m=136733075705494&w=2
- http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf
- http://secunia.com/advisories/50050
- http://www.kde.org/info/security/advisory-20120810-1.txt
- http://www.openwall.com/lists/oss-security/2012/08/04/1
- http://www.openwall.com/lists/oss-security/2012/08/04/5
- http://www.openwall.com/lists/oss-security/2012/08/06/1
- http://www.openwall.com/lists/oss-security/2012/08/06/6
- http://www.openwall.com/lists/oss-security/2012/08/10/1
- http://www.securityfocus.com/bid/54816
- http://www.ubuntu.com/usn/USN-1525-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77482