First published: Tue Apr 12 2005(Updated: )
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openoffice Openoffice | =1.0.2 | |
Openoffice Openoffice | =1.1.1 | |
Openoffice Openoffice | =1.1.2 | |
Openoffice Openoffice | =1.0.1 | |
Openoffice Openoffice | =1.1.4 | |
Openoffice Openoffice | =1.1.0 | |
Openoffice Openoffice | =1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.