Bug 251967 - (CVE-2007-2834) CVE-2007-2834 openoffice.org TIFF parsing heap overflow
CVE-2007-2834 openoffice.org TIFF parsing heap overflow
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 251971 251972 251973 251974 251975 251979 251981 293361 293371
  Show dependency treegraph
Reported: 2007-08-13 14:06 EDT by Mark J. Cox
Modified: 2008-01-14 11:58 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-01-14 11:58:39 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
proposed patch (2.44 KB, patch)
2007-08-13 14:06 EDT, Mark J. Cox
no flags Details | Diff

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0848 normal SHIPPED_LIVE Important: openoffice.org security update 2007-09-18 04:05:02 EDT

  None (edit)
Description Mark J. Cox 2007-08-13 14:06:48 EDT
An anonymous researcher reported to iDefense  a heap overflow in TIFF parsing in
OpenOffice.org.  If a victim opens a carefully crafted document containing a
malicious TIFF file it could lead to arbitrary code execution.

Embargo set to 20070904
Comment 1 Mark J. Cox 2007-08-13 14:06:49 EDT
Created attachment 161195 [details]
proposed patch
Comment 9 Tomas Hoger 2007-09-17 10:29:14 EDT
Vulnerability was publicly announced by OpenOffice.org project and fixed in
OpenOffice.org 2.3:


Removing embargo.
Comment 12 Red Hat Product Security 2008-01-14 11:58:39 EST
This issue was addressed in:

Red Hat Enterprise Linux:


Note You need to log in before you can comment on or make changes to this bug.