Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-1149
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-21 Jun, 2012 | 15:55
Updated At-11 Apr, 2025 | 00:51

Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a .DOC file, which triggers a heap-based buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

libreoffice
libreoffice
>>libreoffice>>Versions up to 3.5.2(inclusive)
cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>6.0
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>7.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5.0
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>5.0
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>6.2
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_eus>>6.2.z
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>openoffice.org>>3.3.0
cpe:2.3:a:apache:openoffice.org:3.3.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>openoffice.org>>3.4
cpe:2.3:a:apache:openoffice.org:3.4:beta:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>15
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>16
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://archives.neohapsis.com/archives/bugtraq/2012-05/0089.htmlsecalert@redhat.com
Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.htmlsecalert@redhat.com
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081319.htmlsecalert@redhat.com
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0705.htmlsecalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/46992secalert@redhat.com
N/A
http://secunia.com/advisories/47244secalert@redhat.com
N/A
http://secunia.com/advisories/49140secalert@redhat.com
N/A
http://secunia.com/advisories/49373secalert@redhat.com
N/A
http://secunia.com/advisories/49392secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/50692secalert@redhat.com
N/A
http://secunia.com/advisories/60799secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-201209-05.xmlsecalert@redhat.com
Third Party Advisory
http://securitytracker.com/id?1027068secalert@redhat.com
Patch
Third Party Advisory
VDB Entry
http://www.debian.org/security/2012/dsa-2473secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2012/dsa-2487secalert@redhat.com
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xmlsecalert@redhat.com
Third Party Advisory
http://www.libreoffice.org/advisories/cve-2012-1149/secalert@redhat.com
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:090secalert@redhat.com
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2012:091secalert@redhat.com
Broken Link
http://www.openoffice.org/security/cves/CVE-2012-1149.htmlsecalert@redhat.com
Third Party Advisory
http://www.osvdb.org/81988secalert@redhat.com
Broken Link
http://www.securityfocus.com/bid/53570secalert@redhat.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/75692secalert@redhat.com
N/A
http://archives.neohapsis.com/archives/bugtraq/2012-05/0089.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081319.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0705.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/46992af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/47244af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/49140af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/49373af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/49392af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/50692af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60799af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-201209-05.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1027068af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
VDB Entry
http://www.debian.org/security/2012/dsa-2473af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2012/dsa-2487af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.libreoffice.org/advisories/cve-2012-1149/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:090af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2012:091af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openoffice.org/security/cves/CVE-2012-1149.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.osvdb.org/81988af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/53570af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/75692af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found