First published: Wed Aug 06 2008(Updated: )
Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in the memory allocator in OpenOffice.org (OOo) 2.4.1, on 64-bit platforms, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted document, related to a "numeric truncation error," a different vulnerability than CVE-2008-2152.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | =2.4.1 | |
Apache OpenOffice | =2.4.1 | |
Fedora | =8 | |
Fedora | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3282 is classified as a medium severity vulnerability due to its potential to cause denial of service and the possibility of arbitrary code execution.
To fix CVE-2008-3282, users should upgrade to a patched version of OpenOffice.org that addresses this vulnerability.
CVE-2008-3282 affects OpenOffice.org version 2.4.1 on 64-bit platforms and specific releases of Fedora 8 and 9.
Exploiting CVE-2008-3282 may lead to application crashes or allow attackers to execute arbitrary code through specially crafted documents.
CVE-2008-3282 is a remote vulnerability, allowing attacks via crafted documents opened in the affected software.