First published: Thu Oct 07 2010(Updated: )
A heap-based buffer overflow was found in the way OpenOffice.org imported Microsoft Word Binary File Format (.DOC) files with certain user defined list styles (WW8). If a user opened a specially-crafted DOC file in OpenOffice.org suite tool (oowriter), it could lead to denial of service (oowriter executable crash), or possibly, execute arbitrary code with the privileges of the user running OpenOffice.org Writer. References: [1] <a href="http://www.cs.brown.edu/people/drosenbe/research.html">http://www.cs.brown.edu/people/drosenbe/research.html</a> Acknowledgements: Red Hat would like to thank OpenOffice.org for reporting this issue. Upstream acknowledges Dan Rosenberg of Virtual Security Research as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-640950 is considered high due to its potential to cause a denial of service.
To fix REDHAT-BUG-640950, ensure you update your OpenOffice.org to the latest version that addresses this vulnerability.
REDHAT-BUG-640950 specifically affects OpenOffice.org when handling specially-crafted Microsoft Word Binary File Format (.DOC) files.
Yes, opening a malicious .DOC file that exploits REDHAT-BUG-640950 could potentially lead to data loss.
REDHAT-BUG-640950 is a heap-based buffer overflow vulnerability.