CVE-2010-4643
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://osvdb.org/70718
CVE, Inc., Red Hat
Broken Link
http://secunia.com/advisories/40775
CVE, Inc., Red Hat
Broken Link
http://secunia.com/advisories/42999
CVE, Inc., Red Hat
Broken Link
http://secunia.com/advisories/43065
CVE, Inc., Red Hat
Broken Link
http://secunia.com/advisories/43105
CVE, Inc., Red Hat
Broken Link
http://secunia.com/advisories/43118
CVE, Inc., Red Hat
Broken Link
http://secunia.com/advisories/60799
CVE, Inc., Red Hat
Broken Link
http://ubuntu.com/usn/usn-1056-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.debian.org/security/2011/dsa-2151
CVE, Inc., Red Hat
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
CVE, Inc., Red Hat
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
CVE, Inc., Red Hat
Broken Link
http://www.openoffice.org/security/cves/CVE-2010-4643.html
CVE, Inc., Red Hat
Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
CVE, Inc., Red Hat
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0181.html
CVE, Inc., Red Hat
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0182.html
CVE, Inc., Red Hat
Broken Link
http://www.securityfocus.com/bid/46031
CVE, Inc., Red Hat
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1025002
CVE, Inc., Red Hat
Broken Link
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2011/0230
CVE, Inc., Red Hat
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0232
CVE, Inc., Red Hat
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0279
CVE, Inc., Red Hat
Broken Link
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=667588
CVE, Inc., Red Hat
Issue Tracking
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/65441
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-787
Out-of-bounds Write
NIST
Change History
10 change records found show changes
CVE Modified by CVE 11/20/2024 8:21:25 PM
Action
Type
Old Value
New Value
Added
Reference
http://osvdb.org/70718
Added
Reference
http://secunia.com/advisories/40775
Added
Reference
http://secunia.com/advisories/42999
Added
Reference
http://secunia.com/advisories/43065
Added
Reference
http://secunia.com/advisories/43105
Added
Reference
http://secunia.com/advisories/43118
Added
Reference
http://secunia.com/advisories/60799
Added
Reference
http://ubuntu.com/usn/usn-1056-1
Added
Reference
http://www.debian.org/security/2011/dsa-2151
Added
Reference
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
Added
Reference
http://www.openoffice.org/security/cves/CVE-2010-4643.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
Added
Reference
http://www.redhat.com/support/errata/RHSA-2011-0181.html
Added
Reference
http://www.redhat.com/support/errata/RHSA-2011-0182.html
Added
Reference
http://www.securityfocus.com/bid/46031
Added
Reference
http://www.securitytracker.com/id?1025002
Added
Reference
http://www.vupen.com/english/advisories/2011/0230
Added
Reference
http://www.vupen.com/english/advisories/2011/0232
Added
Reference
http://www.vupen.com/english/advisories/2011/0279
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=667588
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/65441
CVE Modified by Red Hat, Inc. 5/13/2024 10:24:22 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 2/12/2023 10:20:23 PM
Action
Type
Old Value
New Value
Changed
Description
CVE-2010-4643 OpenOffice.org: heap based buffer overflow when parsing TGA files
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
Removed
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Removed
Reference
https://access.redhat.com/errata/RHSA-2011:0181 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2011:0182 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2011:0183 [No Types Assigned]
Removed
Reference
https://access.redhat.com/security/cve/CVE-2010-4643 [No Types Assigned]
Removed
CVSS V2 Metadata
Victim must voluntarily interact with attack mechanism
CVE Modified by Red Hat, Inc. 2/02/2023 10:15:19 AM
Action
Type
Old Value
New Value
Changed
Description
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
CVE-2010-4643 OpenOffice.org: heap based buffer overflow when parsing TGA files
Added
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Added
Reference
https://access.redhat.com/errata/RHSA-2011:0181 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2011:0182 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2011:0183 [No Types Assigned]
Added
Reference
https://access.redhat.com/security/cve/CVE-2010-4643 [No Types Assigned]
Modified Analysis by NIST 2/07/2022 11:37:55 AM
Action
Type
Old Value
New Value
Added
CWE
NIST CWE-787
Removed
CWE
NIST CWE-119
Changed
CPE Configuration
OR
*cpe:2.3:a:sun:openoffice.org:3.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.2.1:*:*:*:*:*:*:*
OR
*cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:* versions from (including) 2.0.0 up to (excluding) 3.3.0
Removed
CPE Configuration
OR
*cpe:2.3:a:sun:openoffice.org:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.4:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.2.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.3.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.3.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.2:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.3:*:*:*:*:*:*:*
Changed
Reference Type
http://osvdb.org/70718 No Types Assigned
http://osvdb.org/70718 Broken Link
Changed
Reference Type
http://secunia.com/advisories/40775 No Types Assigned
http://secunia.com/advisories/40775 Broken Link
Changed
Reference Type
http://secunia.com/advisories/42999 Vendor Advisory
http://secunia.com/advisories/42999 Broken Link
Changed
Reference Type
http://secunia.com/advisories/43065 Vendor Advisory
http://secunia.com/advisories/43065 Broken Link
Changed
Reference Type
http://secunia.com/advisories/43105 Vendor Advisory
http://secunia.com/advisories/43105 Broken Link
Changed
Reference Type
http://secunia.com/advisories/43118 Vendor Advisory
http://secunia.com/advisories/43118 Broken Link
Changed
Reference Type
http://secunia.com/advisories/60799 No Types Assigned
http://secunia.com/advisories/60799 Broken Link
Changed
Reference Type
http://ubuntu.com/usn/usn-1056-1 No Types Assigned
http://ubuntu.com/usn/usn-1056-1 Third Party Advisory
Changed
Reference Type
http://www.debian.org/security/2011/dsa-2151 No Types Assigned
http://www.debian.org/security/2011/dsa-2151 Third Party Advisory
Changed
Reference Type
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml No Types Assigned
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml Third Party Advisory
Changed
Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2011:027 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2011:027 Broken Link
Changed
Reference Type
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html Third Party Advisory
Changed
Reference Type
http://www.redhat.com/support/errata/RHSA-2011-0181.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2011-0181.html Broken Link
Changed
Reference Type
http://www.redhat.com/support/errata/RHSA-2011-0182.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2011-0182.html Broken Link
Changed
Reference Type
http://www.securityfocus.com/bid/46031 No Types Assigned
http://www.securityfocus.com/bid/46031 Broken Link, Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securitytracker.com/id?1025002 No Types Assigned
http://www.securitytracker.com/id?1025002 Broken Link, Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.vupen.com/english/advisories/2011/0230 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0230 Broken Link, Vendor Advisory
Changed
Reference Type
http://www.vupen.com/english/advisories/2011/0232 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0232 Broken Link, Vendor Advisory
Changed
Reference Type
http://www.vupen.com/english/advisories/2011/0279 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0279 Broken Link, Vendor Advisory
Changed
Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=667588 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=667588 Issue Tracking, Third Party Advisory
Changed
Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/65441 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/65441 Third Party Advisory, VDB Entry
CVE Modified by Red Hat, Inc. 8/16/2017 9:33:17 PM
Action
Type
Old Value
New Value
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/65441 [No Types Assigned]
Removed
Reference
http://xforce.iss.net/xforce/xfdb/65441 [No Types Assigned]
CVE Translated by NIST 2/17/2016 4:45:02 PM
Action
Type
Old Value
New Value
Added
Translation
Desbordamiento de buffer basado en memoria dinámica en Impress en OpenOffice.org (OOo) 2.x y 3.x en versiones anteriores a 3.3 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario a través de un archivo Truevision TGA (TARGA) manipulado en un documento ODF o Microsoft Office.
Removed
Translation
Desbordamiento de búfer basado en memoria dinámica en Impress en OpenOffice.org (OOo) v2.x y v3.x anteriores v3.3 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código arbitrario a través de un fichero TGA manipulado en un fichero ODF o Microsoft Office.
Modified Analysis by NIST 11/17/2015 11:16:17 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Configuration 1
OR
*cpe:2.3:a:sun:openoffice.org:2.4.3:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.4:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.3.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.2.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.3.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.2:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.1:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:sun:openoffice.org:3.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.2.1:*:*:*:*:*:*:*
Configuration 1
OR
*cpe:2.3:a:sun:openoffice.org:3.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:3.2.1:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:sun:openoffice.org:2.4.3:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.4:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.3.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.2.1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.3.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.2:*:*:*:*:*:*:*
*cpe:2.3:a:sun:openoffice.org:2.4.1:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 11/13/2014 10:00:30 PM
Action
Type
Old Value
New Value
Added
Reference
http://secunia.com/advisories/40775
Initial CVE Analysis 1/31/2011 2:41:00 PM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2010-4643 NVD
Published Date: 01/28/2011 NVD
Last Modified: 04/10/2025
Source: Red Hat, Inc.