Описание
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
edgy | not-affected | |
feisty | not-affected | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.0.2-2ubuntu5 |
devel | released | 2.0.2-2ubuntu5 |
edgy | released | 2.0.2-2ubuntu5 |
feisty | released | 2.0.2-2ubuntu5 |
upstream | needs-triage |
Показывать по
EPSS
5.1 Medium
CVSS2
Связанные уязвимости
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 ...
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
EPSS
5.1 Medium
CVSS2