First published: Tue May 29 2012(Updated: )
Multiple heap-based buffer overflow flaws were found in the XML manifest encryption handling code of OpenOffice.org and LibreOffice: 1) Previously it was not checked if the particular tag was contained within expected parent tag, leading to possibility of child tag handler being able to write its data into different (than expected) parent handler sequence, leading to heap buffer overflow, 2) also a fixed size sequence was allocated to record properties of a particular XML tag, associated with XML element. By duplicating certain tags in XML manifest it was possible to write past the heap-based buffer bounds, 3) yet, the Base64 decoder implementation incorrectly assumed the length of ChecksumAttribute (input buffer) to be evenly divisible by 4, leading into the storage for output (Base64 decoded) buffer to be underallocated, resulting into heap buffer overflow. A remote attacker could provide a specially-crafted Open Document Text (.odt) file, that when opened would cause OpenOffice.org / LibreOffice to crash or, potentially execute arbitrary code with the privileges of the user running a tool from the suite.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | <3.4.1 | |
Libreoffice Libreoffice | <3.5.5 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =11.04 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =12.04 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =6.0 | |
Redhat Enterprise Linux For Power Big Endian | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server From Rhui 6 | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.