First published: Tue May 29 2012(Updated: )
Multiple heap-based buffer overflow flaws were found in the XML manifest encryption handling code of OpenOffice.org and LibreOffice: 1) Previously it was not checked if the particular tag was contained within expected parent tag, leading to possibility of child tag handler being able to write its data into different (than expected) parent handler sequence, leading to heap buffer overflow, 2) also a fixed size sequence was allocated to record properties of a particular XML tag, associated with XML element. By duplicating certain tags in XML manifest it was possible to write past the heap-based buffer bounds, 3) yet, the Base64 decoder implementation incorrectly assumed the length of ChecksumAttribute (input buffer) to be evenly divisible by 4, leading into the storage for output (Base64 decoded) buffer to be underallocated, resulting into heap buffer overflow. A remote attacker could provide a specially-crafted Open Document Text (.odt) file, that when opened would cause OpenOffice.org / LibreOffice to crash or, potentially execute arbitrary code with the privileges of the user running a tool from the suite.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | ||
LibreOffice Draw |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-826077 is considered high due to multiple heap-based buffer overflow vulnerabilities.
To fix REDHAT-BUG-826077, update Apache OpenOffice and LibreOffice to the latest patched versions.
Affected software versions for REDHAT-BUG-826077 include all versions of Apache OpenOffice and LibreOffice prior to the fix implemented in the latest releases.
REDHAT-BUG-826077 impacts Apache OpenOffice and LibreOffice due to vulnerabilities in their XML manifest encryption handling code.
Yes, REDHAT-BUG-826077 can potentially be exploited remotely, allowing attackers to execute arbitrary code.