Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2010-4253
PUBLISHED
More InfoOfficial Page
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
View Known Exploited Vulnerability (KEV) details
Published At-28 Jan, 2011 | 21:13
Updated At-07 Aug, 2024 | 03:34
Rejected At-
▼CVE Numbering Authority (CNA)

Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/40775
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/46031
vdb-entry
x_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=658259
x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2151
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/60799
third-party-advisory
x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
vendor-advisory
x_refsource_GENTOO
http://www.openoffice.org/security/cves/CVE-2010-4253.html
x_refsource_CONFIRM
http://secunia.com/advisories/43065
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0230
vdb-entry
x_refsource_VUPEN
http://osvdb.org/70717
vdb-entry
x_refsource_OSVDB
http://www.securitytracker.com/id?1025002
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2011/0232
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-0182.html
vendor-advisory
x_refsource_REDHAT
http://ubuntu.com/usn/usn-1056-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2011/0279
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/43105
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/42999
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/40775
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/46031
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=658259
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2011/dsa-2151
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/60799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.openoffice.org/security/cves/CVE-2010-4253.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/43065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2011/0230
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://osvdb.org/70717
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securitytracker.com/id?1025002
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2011/0232
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-0182.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://ubuntu.com/usn/usn-1056-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2011/0279
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/43105
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/42999
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/40775
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/46031
vdb-entry
x_refsource_BID
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=658259
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2011/dsa-2151
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/60799
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
x_refsource_CONFIRM
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.openoffice.org/security/cves/CVE-2010-4253.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/43065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2011/0230
vdb-entry
x_refsource_VUPEN
x_transferred
http://osvdb.org/70717
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securitytracker.com/id?1025002
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2011/0232
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2011-0182.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://ubuntu.com/usn/usn-1056-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2011/0279
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/43105
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/42999
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/40775
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/46031
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=658259
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2011/dsa-2151
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/60799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.openoffice.org/security/cves/CVE-2010-4253.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/43065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0230
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://osvdb.org/70717
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securitytracker.com/id?1025002
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0232
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-0182.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://ubuntu.com/usn/usn-1056-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0279
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/43105
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/42999
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Details not found